ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Firewall Protection
5-45
v1.0, September 2009
Note these restrictions on port triggering:
•
Only one PC can use a port triggering application at any time.
•
After a PC has finished using a port triggering application, there is a short time-out period
before the application can be used by another PC. This time-out period is required so the UTM
can determine that the application has terminated.
To add a port triggering rule:
1.
Select
Network
Security
>
Port Triggering
from the menu. The Port Triggering screen
displays. (
Figure 5-28
shows a rule in the Port Triggering Rule table as an example.)
2.
Below Add Port Triggering Rule, enter the settings as explained in
Table 5-10 on page 5-46
.
Note:
For additional ways of allowing inbound traffic, see
“Inbound Rules (Port Forwarding)” on page 5-6
.
Figure 5-28
Содержание UTM10 - ProSecure Unified Threat Management Appliance
Страница 6: ...v1 0 September 2009 vi...
Страница 16: ...ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual xvi v1 0 September 2009...
Страница 114: ...ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual 4 28 LAN Configuration v1 0 September 2009...
Страница 464: ...ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual E 2 Related Documents v1 0 September 2009...