Cisco SA520-K9 Administration Guide - Page 123

Configuring Session Settings to Analyze Incoming Packets, TCP Session Timeout Duration seconds

Page 123 highlights

Firewall Configuration Port Triggering 4 • LAN/DMZ IP Address: Displays the LAN IP address of the device which caused the ports to be opened. • Open Ports: Displays the ports that have been opened so that traffic from WAN destined to the LAN IP address can flow through the security appliance. • Time Remaining: This field displays the time for which the port will remain open when there is no activity on that port. The time is reset when there is activity on the port. Configuring Session Settings to Analyze Incoming Packets Use this page to configure how incoming packets are analyzed. STEP 1 Click Firewall > Session Setting. The Session Settings window opens. STEP 2 Enter the following information: • Maximum Unidentified Sessions: This value defines the maximum number of unidentified sessions for the ALG identification process. This value can range between 2 and 128. The default is 32 sessions. • Maximum Half Open Sessions: The gateway preserves resources by limiting the number of half-open sessions at any given time. A half-open session is the session state between receipt of a SYN packet and the SYN/ ACK packet. Under normal circumstances, a session is allowed to remain in the half-open state for 10 seconds. The maximum value can range between 0 and 3,000. The default is 1,024 sessions. • TCP Session Timeout Duration (seconds): Inactive TCP sessions are removed from the session table after this duration. Most TCP sessions terminate normally when the RST or FIN flags are detected. This value can range between 0 and 4,294,967 seconds. The default is 1,800 seconds (30 minutes). • UDP Session Timeout Duration (seconds): Inactive UDP sessions are removed from the session table after this duration. This value can range between 0 and 4,294,967 seconds. The default is 120 seconds (2 minutes). • Other Session Timeout Duration (seconds): Inactive non-TCP/UDP sessions are removed from the session table after this duration. This value can range between 0 and 4,294,967 seconds. The default is 60 seconds. Cisco SA500 Series Security Appliances Administration Guide 123

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Firewall Configuration
Port Triggering
Cisco SA500 Series Security Appliances Administration Guide
123
4
LAN/DMZ IP Address:
Displays the LAN IP address of the device which
caused the ports to be opened.
Open Ports:
Displays the ports that have been opened so that traffic from
WAN destined to the LAN IP address can flow through the security
appliance.
Time Remaining:
This field displays the time for which the port will remain
open when there is no activity on that port. The time is reset when there is
activity on the port.
Configuring Session Settings to Analyze Incoming Packets
Use this page to configure how incoming packets are analyzed.
STEP 1
Click
Firewall > Session Setting
.
The Session Settings window opens.
STEP 2
Enter the following information:
Maximum Unidentified Sessions:
This value defines the maximum number
of unidentified sessions for the ALG identification process. This value can
range between 2 and 128. The default is 32 sessions.
Maximum Half Open Sessions:
The gateway preserves resources by
limiting the number of half-open sessions at any given time. A half-open
session is the session state between receipt of a SYN packet and the SYN/
ACK packet. Under normal circumstances, a session is allowed to remain in
the half-open state for 10 seconds. The maximum value can range between
0 and 3,000. The default is 1,024 sessions.
TCP Session Timeout Duration (seconds):
Inactive TCP sessions are
removed from the session table after this duration. Most TCP sessions
terminate normally when the RST or FIN flags are detected. This value can
range between 0 and 4,294,967 seconds. The default is 1,800 seconds (30
minutes).
UDP Session Timeout Duration (seconds):
Inactive UDP sessions are
removed from the session table after this duration. This value can range
between 0 and 4,294,967 seconds. The default is 120 seconds (2 minutes).
Other Session Timeout Duration (seconds):
Inactive non-TCP/UDP
sessions are removed from the session table after this duration. This value
can range between 0 and 4,294,967 seconds. The default is 60 seconds.