iskratel si2000 callisto821 router Manual De Usuario
SI2000 Callisto821+ Router Users Guide
102/107
figure 81: The Add Host Validator page.
2. In
the
Host IP Address text box, type the IP address that you want to allow/block.
3. In the Host Subnet Mask text box, type the IP mask address. If you want to filter a range of
addresses, you can specify the mask, for example, 255.255.255.0. If you want to filter a single IP
address, use the specific IP mask address, for example, 255.255.255.255.
address, use the specific IP mask address, for example, 255.255.255.255.
4. Click
on
the
Direction drop-down list and select the direction of traffic that you want the validator to
filter.
5. Click
on
Apply. The Configure Validators page is displayed, containing details of the host validator
that you have just added.
6. Each portfilter displayed in the Configure Validators page has a Delete Host Validator hyperlink
assigned to it. To delete a validator, click on this link, then at the confirmation page, click on the
Delete Host Validator button. The validator is removed from the Firewall configuration.
Delete Host Validator button. The validator is removed from the Firewall configuration.
8.3.2 Triggers
Configuring Triggers
A trigger allows an application to open a secondary port in order to transport packets. The most common
applications that require secondary ports are FTP and NetMeeting.
To configure a trigger:
applications that require secondary ports are FTP and NetMeeting.
To configure a trigger:
1. Go to the Policies, Triggers and Intrusion Detection section of the Security Interface Configuration.
Click on Firewall Trigger Configuration. The Firewall Trigger Configuration page is displayed. There
are no triggers defined at this time. Click on the New Trigger link. The following page is displayed:
are no triggers defined at this time. Click on the New Trigger link. The following page is displayed: