X7028r User’s Manual
Version 2.0
- 49 -
Return to the
Interface List
and click on the
Firewall Trigger
Configuration
link. A trigger is the term used to describe what
happens when a secondary port is opened dynamically to allow
protocols such as FTP and NetMeeting to pass data through the
Firewall. Click on
New Trigger
to add a new firewall trigger.
Firewall Add Trigger
: The following fields are required for adding
a firewall trigger.
Field Name
Description
Transport type
Choose between TCP or UDP
Port number start
Enter the starting port number, for example 21
for FTP
Port number end
Enter the ending port number, for example 21
for FTP
Allow multiple hosts Choose between allow or block
Max Activity Interval Enter the activity interval per second.
Enable Session
Chaining
Choose between allow or block
Enable UDP
Session Chaining
Choose between allow or block
Binary Address
Replacement
Choose between allow or block
Address Translation
Type
Choose between TCP, UDP, both, or none.
Click on
Configure Intrusion Detection
link under the
Policies,
Triggers and Intrusion Detection
section. On this page you will
be able to select whether you would like to use a black list and
victim protection. You can also set values for Dos attack block
duration, scan attack block duration, Victim protection block
duration, maximum TCP open handshaking count, maximum ping
count, and maximum ICMP count.
Click on the
Apply
button once you have set/changed these
values.