ZyXEL UAG4100 User Guide - Page 296
Session Control Screen
View all ZyXEL UAG4100 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 296 highlights
Chapter 25 Security Policy Table 131 Configuration > Security Policy > Policy Control > Add/Edit (continued) LABEL User DESCRIPTION This field is not available when you are configuring a to-UAG policy. Select a user name or user group to which to apply the policy. The security policy is activated only when the specified user logs into the system and the policy will be disabled when the user logs out. Otherwise, select any and there is no need for user logging. Schedule Action Log matched traffic UTM Profile Application Patrol Content Filter OK Cancel Note: If you specified a source IP address (group) instead of any in the field below, the user's IP address should be within the IP address range. Select a schedule that defines when the policy applies. Otherwise, select none and the policy is always effective. Use the drop-down list box to select what the security policy is to do with packets that match this rule. Select deny to silently discard the packets without sending a TCP reset packet or an ICMP destination-unreachable message to the sender. Select allow to permit the passage of the packets. Select whether to have the UAG generate a log (log), log and alert (log alert) or not (no) when the policy is matched. See Chapter 47 on page 534 for more on logs. Use this section to apply UTM profiles (created in the Configuration > UTM Profile screens) to traffic that matches the criteria above. You must have created a profile first; otherwise none displays. Select by profile to decide whether a log will be generated based on the UTM profile's settings. Otherwise, select no to not generate a log for all traffic that matches criteria in the profile. Select an Application Patrol profile from the list box; none displays if no profiles have been created in the Configuration > UTM Profile > App Patrol screen. Select a Content Filter profile from the list box; none displays if no profiles have been created in the Configuration > UTM Profile > Content Filter screen. Click OK to save your customized settings and exit this screen. Click Cancel to exit this screen without saving. 25.3 Session Control Screen Click Configuration > Security Policy > Session Control to display the Security Policy Session Control screen. Use this screen to limit the number of concurrent NAT/security policy sessions a client can use. You can apply a default limit for all users and individual limits for specific users, addresses, or both. The individual limit takes priority if you apply both. UAG Series User's Guide 296