User Manual
Aolynk DR811/DR814 ADSL2+Broadband Router 4 Web-based Management
33
l Transport Type: select a transport type from the drop-down list, depending on
whether you are adding a trigger for a TCP or a UDP application.
l Port Number Start: type the start of the trigger port range that the primary session
uses.
l Port Number End: type the end of the trigger port range that the primary session
uses.
l Secondary Port Number Start: type the start of the trigger port range that the
secondary session uses.
l Secondary Port Number End: type the end of the trigger port range that the
secondary session uses.
l Allow Multiple Hosts: select Allow if you want a secondary session to be
initiated to/from different remote hosts. Select Block if you want a secondary
session to be initiated only to/from the same remote host.
l Max Activity Interval: type the maximum interval time (in milliseconds) between
the use of secondary port sessions.
l Enable Session Chaining: select Allow or Block depending on whether you
want to allow multi-level TCP session chaining.
l Enable UDP Session Chaining: select Allow or Block depending on whether
you want to allow multi-level UDP and TCP session chaining. Enable Session
Chaining must be set to Allow for this option to work.
l Binary Address Replacement: select Allow or Block depending on whether you
want to use binary address replacement on an existing trigger.
l Address Translation Type: specify what type of address replacement is set on a
trigger. Binary Address Replacement must be set to Allow for this option to
work.
Once you have configured the trigger, click the button. The Security Trigger
Configuration page is displayed, containing details of the trigger that you have just
configured.
To delete an existing security trigger, click the corresponding label to open the
web page Delete Triggers.