User Manual
Aolynk DR811/DR814 ADSL2+Broadband Router
Transport Type: select a transport type from the drop-down list, depending on
l
whether you are adding a trigger for a TCP or a UDP application.
Port Number Start: type the start of the trigger port range that the primary session
l
uses.
Port Number End: type the end of the trigger port range that the primary session
l
uses.
Secondary Port Number Start: type the start of the trigger port range that the
l
secondary session uses.
Secondary Port Number End: type the end of the trigger port range that the
l
secondary session uses.
Allow Multiple Hosts: select Allow if you want a secondary session to be
l
initiated to/from different remote hosts. Select Block if you want a secondary
session to be initiated only to/from the same remote host.
Max Activity Interval: type the maximum interval time (in milliseconds) between
l
the use of secondary port sessions.
Enable Session Chaining: select Allow or Block depending on whether you
l
want to allow multi-level TCP session chaining.
Enable UDP Session Chaining: select Allow or Block depending on whether
l
you want to allow multi-level UDP and TCP session chaining. Enable Session
Chaining must be set to Allow for this option to work.
Binary Address Replacement: select Allow or Block depending on whether you
l
want to use binary address replacement on an existing trigger.
Address Translation Type: specify what type of address replacement is set on a
l
trigger. Binary Address Replacement must be set to Allow for this option to
work.
Once you have configured the trigger, click the
Configuration page is displayed, containing details of the trigger that you have just
configured.
To delete an existing security trigger, click the corresponding
web page Delete Triggers.
button. The Security Trigger
33
4 Web-based Management
label to open the