NETGEAR STM150EW3-100NAS manual Enabling Session Limits and Timeouts

Page 33

ProSecure Web/Email Security Threat Management Appliance STM150 Reference Manual

Enabling Session Limits and Timeouts

You enable session limits and timeouts on the Global Settings > Network Setting > Session Limit screen.

Figure 3-2

This page allows you to specify total number sessions per user (IP) allowed across the router. Session limiting is disabled by default. When session limiting is enabled, the STM150 will set the maximum number of sessions per IP either as a percentage of the maximum sessions or as an absolute number of maximum sessions.

To increase the maximum number of sessions per IP, check Yes under Do you want to enable Session Limit? The Percentage of Max Sessions option is computed on the total connection capacity of the device. The Number of Sessions option specifies the maximum number of sessions that should be allowed via the STM150 from a single source machine. Please note that some protocols like ftp, rstp create 2 sessions per connection which should be considered when configuring session limiting. Enter the new session limit under User Limit.

The Session Timeout section allows you to manually define the TCP, UDP, and ICMP timeout values. If a session goes without data flow longer than the configured values, the session will be terminated by the system. The default session timeout of TCP, UDP and ICMP is 1200, 800 and 8 seconds. Enter the timeout values in their respective fields.

Performing System Management Tasks

3-3

v1.1, March 2009

Image 33
Contents NETGEAR, Inc Statement of Conditions TrademarksEU Regulatory Compliance Statement Bestätigung des Herstellers/ImporteursAdditional Copyrights Voluntary Control Council for Interference Vcci StatementMD5 Zlib Product and Publication DetailsV1.1, March Contents Chapter Performing System Management Tasks Chapter Monitoring System Performance Page Conventions, Formats, and Scope About This ManualManual Part Publication Version Description Number Date Revision HistoryChapter Introduction About Stream Scanning Key Features and CapabilitiesWhat Can You Do with an STM150? Front Panel Features Service Registration Card with License KeysRear Panel Features Choosing a Location for the STM150 Default IP Address, Login Name, and Password LocationUsing the Rack Mounting Kit V1.1, March Choosing a Deployment Scenario Provisioning Threat Management ServicesGateway Deployment Server Group Segmented LAN Deployment Use the Installation Guide to Perform Initial ConfigurationLogging In to the STM150 V1.1, March Click Register Registering the STM150Setup Wizard Options Use the Setup Wizard to Complete the ConfigurationEmail Security Web SecurityUpdate Settings Verifying the STM150 InstallationEmail Notification Server Web CategoriesTesting Connectivity Testing Http ScanningWhat to Do Next Modifying System Settings Configuring Network SettingsPerforming System Management Tasks V1.1, March Enabling Session Limits and Timeouts On the menu, click Global Settings Scanning Exclusions Scanning ExclusionsTo enter a scanning exclusion rule Setting the System Time On the menu, click Administration Time ZoneTo set the system time To specify a notification server Specifying the Notification ServerCustomizing Email Alerts Click Save ChangesTo enable system administrator email alerts Configuring Snmp Settings To configure the Snmp settingsOn the menu, click Administration Snmp Supported MIB Browsers Defining Trusted Snmp HostsTo define Snmp Traps Backing Up the STM150 Configuration Backing Up and Restoring ConfigurationsTo Back Up the STM150 Settings Restoring a ConfigurationTo restore the STM150 settings Restarting the STM150 Resetting to Factory DefaultsEnabling Remote Management Configuring Scheduled Updates Administering Software UpdatesTo configure scheduled updates Performing a Manual UpdateOn the menu, go to Administration Software Update Applying a Software Update that Requires a Reboot Administering Admin Login Timeouts and Passwords V1.1, March V1.1, March Chapter Customizing Scans Default Scan SettingsCustomizing Email Scanning Settings End User Email Notification Settings Email Security Anti-Virus Notification Settings on the menuInsert Warning into Email Subject Line Smtp Send Warning Email When Malware Is Found Append Safe Stamp Smtp & POP3Replace Infected Attachment with Warning Message Email Content Filtering Filter by Subject Keywords Filter by Password-protected AttachmentsFile Extension Filter by File TypeProtecting Against Email Spam Setting Up the Whitelist and BlacklistEmail Security Anti-Spam Whitelist and Blacklist To define the sender whitelist. On the menu, go toTo define the recipient whitelist. On the menu, go to Configuring the Real-time BlacklistTo add a new provider Configuring Distributed Spam AnalysisTo configure distributed spam analysis Customizing Web Scanning Settings Configuring Web Malware Scans Configuring Web Content Filtering V1.1, March V1.1, March White List Configuring Web URL FilteringBlacklist Https Scan Settings Http TunnelingHttps Third Party Website Certificate Handling STM150 CA Certificate Show This Message When an SSL Connection Attempt FailsV1.1, March Web Security Https Scan Certificate Management Certificate ManagementTo import a new certificate used for Https scans Trusted Certificate AuthoritiesUntrusted Certificates To add hosts to the Host Access Control List Trusted HostsWeb Security Http and Https Trusted Hosts Configuring FTP Scan To delete hosts from the Host Access Control ListWeb Security FTP V1.1, March Chapter Monitoring System Performance Viewing the System Status Using Statistics and Web Usage Data V1.1, March Monitoring Security Running Diagnostics Using the Network Diagnostic ToolsMonitoring Diagnostics Using the Realtime Traffic Diagnostic Tools Gathering Important Log InformationTo collect information about your STM150 Using Reports to Optimize Protection and Performance Generate Network Statistics ReportWorking with Logs Sending Logs Querying LogsLog Management Using Logs to Identify Infected ClientsWorking with Reports Send Reports by EmailOn the menu, click Logs & Reports Scheduled Report Using Online Support Enabling Remote TroubleshootingSupport Online Support To install a hot fix Working with Hot FixesGo to Support Hot Fixes On the menu, go to Support Malware Analysis Sending Suspicious Files to Netgear for AnalysisTable A-1. STM150 Default Configuration Settings Appendix a Default Settings and Technical SpecificationsSTM150 specifications are listed in the table below Document Link Appendix B Related DocumentsV1.1, March Index N