User guide
RG Internet Profile Creating RG Profiles with Field Descriptions
7-43
AlliedView NMS Administration Guide (Provisioning the iMG/RG)
Triggers A set of attributes that allows an application to open a secondary port to transport
packets. A trigger opens a secondary port dynamically, and allows you to define the
length of time the port can be inactive before it is closed.
- Trigger Name - a label that helps identify the trigger. It cannot start with a digit.
- Type - protocol for the application, tcp or udp
- Start Port - First port in the range for the control session.
- End Port - Last port in the range for the control session.
- Max. Act. Interval - the amount of time (in milliseconds) the secondary port is
allowed to pass traffic before it is closed. The default is 3000 (3 seconds).
Advanced Trigger Parameters These are attributes for when the user wants more control over the trigger feature:
- Secondary Start Port - The start of the secondary port range for an existing trigger.
- Secondary End Port - The end of the secondary port range for an existing trigger.
- Allow Multiple Hosts - Controls whether a secondary session can be initiated to/
from same or different remote hosts on the same trigger.
- Session Chaining - Whether TCP dynamic sessions can also become triggering ses-
sions, , which allows multi-level session triggering.
- UDP Session Chaining - Whether both UDP and TCP sessions also become trigger-
ing sessions, , which allows multi-level session triggering.
- Binary Address Replacement - enables/disables binary address replacement on an
existing trigger. You can then set the type of address replacement (TCP, UDP, both or
none)
- Address Translation Type - specifies what type of address replacement is set on a
trigger. Incoming packets are searched in order to find their embedded IP address.
The address is then replaced by the correct inside host IP address, and NAT translates
the packets to the correct destination. You can specify whether you want to carry out
address replacement on TCP packets, on UDP packets, or on both TCP and UDP
packets.
Copy values from profile To create a new profile, the user can select an existing profile, which will fill in the
values from that existing profile. The user can then modify any fields.
Create Activated when a Profile Name has been typed, it creates the profile with the entered
values.
Cancel Closes the window
TABLE 7-10 Create RG Internet Profile Security Tab
Attribute Value