Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 57

Configuring the Network Refresh and Permanent MAC Address Bindings, Table 14., Session Limits Settings

Page 57 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance 3. Select the radio buttons, make your selections from the drop-down list, and complete the fields as explained in the following table: Table 14. Session Limits Settings Setting Description (or Subfield and Description) Session Limits Do You Want to Enable per-user Session Limits? Select the Yes radio button to enable session limits, and then fill in the Limit Type and Limit Value fields. The No radio button is selected by default. Limit Type From the Limit Type drop-down list, make one of the following selections: • Percentage of Maximum Sessions. Session limits are set as a percentage of the total connection capacity per user. • Sessions per User. Session limits are set as an absolute number. Limit Value Depending on the selection in the Limit Type field, this value is a percentage or an absolute number. The Total Number of Packets Dropped field, which you cannot configure, shows the total number of packets that are dropped because the session limit has been exceeded. Session Timeouts If a session goes without data flow longer than the configured values, the session is terminated. TCP Timeout The time in seconds after which a TCP session without data flow is terminated. The default time is 1200 seconds. UDP Timeout The time in seconds after which an UDP session without data flow is terminated. The default time is 180 seconds. ICMP Timeout The time in seconds after which an ICMP session without data flow is terminated. The default time is 8 seconds. 4. Click Apply to save your settings. Changing any settings in the Session Timeouts section of the screen requires the STM to restart. If you click Reset, the STM restarts to restore the default network settings. Configuring the Network Refresh and Permanent MAC Address Bindings The STM integrates smart virtual MAC address detection to automatically detect virtual MAC addresses and bind these to an interface. When the network topology changes, a virtual MAC address might no longer be bound to the original interface. If this situation occurs, the host to which the virtual MAC address is assigned is no longer able to communicate with others through the STM. Therefore, the network need to be refreshed to enable the STM to redetect the virtual MAC address on the correct interface. Chapter 3. Performing Network and System Management | 57

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 3.
Performing Network and System Management
|
57
ProSecure Web/Email Security Threat Management (STM) Appliance
3.
Select the radio buttons, make your selections from the drop-down list, and complete the
fields as explained in the following table:
4.
Click
Apply
to save your settings. Changing any settings in the Session Timeouts section of
the screen requires the STM to restart. If you click
Reset
, the STM restarts to restore the
default network settings.
Configuring the Network Refresh and
Permanent MAC Address Bindings
The STM integrates smart virtual MAC address detection to automatically detect virtual MAC
addresses and bind these to an interface. When the network topology changes, a virtual
MAC address might no longer be bound to the original interface. If this situation occurs, the
host to which the virtual MAC address is assigned is no longer able to communicate with
others through the STM. Therefore, the network need to be refreshed to enable the STM to
redetect the virtual MAC address on the correct interface.
Table 14.
Session Limits Settings
Setting
Description (or Subfield and Description)
Session Limits
Do You Want to
Enable per-user
Session Limits?
Select the
Yes
radio button to enable session limits, and then fill in the Limit Type and
Limit Value fields. The No radio button is selected by default.
Limit Type
From the Limit Type drop-down list, make one of the following selections:
Percentage of Maximum Sessions
. Session limits are set as a
percentage of the total connection capacity per user.
Sessions per User
. Session limits are set as an absolute number.
Limit Value
Depending on the selection in the Limit Type field, this value is a
percentage or an absolute number.
The Total Number of Packets Dropped field, which you cannot configure, shows the total
number of packets that are dropped because the session limit has been exceeded.
Session Timeouts
If a session goes without data flow longer than the configured values, the session is terminated.
TCP Timeout
The time in seconds after which a TCP session without data flow is terminated. The
default time is 1200 seconds.
UDP Timeout
The time in seconds after which an UDP session without data flow is terminated. The
default time is 180 seconds.
ICMP Timeout
The time in seconds after which an ICMP session without data flow is terminated. The
default time is 8 seconds.