Quick Reference Guide

ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
Firewall Security and Content Filtering 5-31
v1.0, January 2010
5. Click Add. The new IP/MAC rule will be appear the IP/MAC Bindings table.
The IP/MAC Bindings table lists the currently defined IP/MAC Bind rules:
Name. Displays the user-defined name for this rule.
MAC Addresses. Displays the MAC addresses for this rule.
IP Addresses. Displays the IP addresses for this rule.
Log Dropped Packets. Displays the logging option for this rule.
To edit an IP/MAC bind rule, click edit adjacent to the entry. The following fields of an existing
IP/MAC bind rule can be modified:
MAC Address. Specify the MAC address for this rule.
IP Addresses. Specify the IP address for this rule.
Log Dropped Packets. Specify the logging option for this rule.
To remove an entry from the table, select the IP/MAC Binding entry and click delete.
To see the counter that shows the packets that were dropped because of IP-MAC binding
violations and to set the poll interval, click the Set Poll Interval link at the top of the IP/MAC
Binding screen.
Configuring Port Triggering
Port triggering allows some applications to function correctly that would otherwise be partially
blocked by the VPN firewall when it functions in NAT mode. Some applications require that when
external devices connect to them, they receive data on a specific port or range of ports. The VPN
firewall must send all incoming data for that application only on the required port or range of
ports. Using this feature requires that you know the port numbers used by the application.
Port triggering allows computers on the private network (LAN) to request that one or more ports
be forwarded to them. Unlike basic port forwarding which forwards ports to only one
preconfigured IP address, port triggering waits for an outbound request from the private network
on one of the defined outgoing ports. It then automatically sets up forwarding to the IP address that
sent the request. When the application ceases to transmit data over the port, the VPN firewall waits
for a timeout interval and then closes the port or range of ports, making them available to other
computers on the private network.
Once configured, port triggering operates as follows:
1. A PC makes an outgoing connection using a port number defined in the Port Triggering table.