ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Manually Configuring Internet and WAN Settings 3-15
v1.0, September 2009
a. Figure 3-9 shows one example in the Protocol Binding table. Configure the protocol
binding settings as explained in Table 3-6.
Figure 3-9
Table 3-6. Protocol Binding Settings (UTM25 Only)
Setting Description (or Subfield and Description)
Add Protocol Binding
Service From the pull-down menu, select a service or application to be covered by this
rule. If the service or application does not appear in the list, you must define it
using the Services menu (see “Services-Based Rules” on page 5-3).
Source Network The source network settings determine which computers on your network are
affected by this rule. Select one of the following options from the pull-down
menu:
Any All devices on your LAN.
Single address In the Start Address field, enter the IP address to which the
rule is applied.
Address range In the Start Address field and End Address field, enter the
IP addresses for the range to which the rule is applied.