
14. Provisioning the iMG/RG Creating RG Profiles with Field Descriptions
660
AlliedView NMS Administration Guide
Triggers A set of attributes that allows an application to open a secondary port to transport
packets. A trigger opens a secondary port dynamically, and allows you to define the
length of time the port can be inactive before it is closed.
- Trigger Name - a label that helps identify the trigger. It cannot start with a digit.
- Type - protocol for the application, tcp or udp
- Start Port - First port in the range for the control session.
- End Port - Last port in the range for the control session.
- Max. Act. Interval - the amount of time (in milliseconds) the secondary port is
allowed to pass traffic before it is closed. The default is 3000 (3 seconds).
Advanced Trigger Parameters These are attributes for when the user wants more control over the trigger feature:
- Secondary Start Port - The start of the secondary port range for an existing
trigger.
- Secondary End Port - The end of the secondary port range for an existing trigger.
- Allow Multiple Hosts - Controls whether a secondary session can be initiated to/
from same or different remote hosts on the same trigger.
- Session Chaining - Whether TCP dynamic sessions can also become triggering
sessions, which allows multi-level session triggering.
- UDP Session Chaining - Whether both UDP and TCP sessions also become
triggering sessions, , which allows multi-level session triggering.
- Binary Address Replacement - enables/disables binary address replacement on an
existing trigger. You can then set the type of address replacement (TCP, UDP, both
or none)
- Address Translation Type - specifies what type of address replacement is set on a
trigger. Incoming packets are searched in order to find their embedded IP address.
The address is then replaced by the correct inside host IP address, and NAT
translates the packets to the correct destination. You can specify whether you want
to carry out address replacement on TCP packets, on UDP packets, or on both
TCP and UDP packets.
Copy values from profile To create a new profile, the user can select an existing profile, which will fill in the
values from that existing profile. The user can then modify any fields.
Create Activated when a Profile Name has been typed, it creates the profile with the
entered values.
Cancel Closes the window
TABLE 14-9 Create RG Internet Profile Security Tab
Attribute Value
Comentarios a estos manuales