SonicWALL Gateway
Stream Concurrency Limitations by SonicWALL Security Appliance
Because SonicWALL GAV does not have to perform reassembly, there are no
|
| Concurrent |
| |
|
| Connections |
| |
| Cache Size | Compressed |
| |
| Connections | (Concurrent | File Downloads |
|
Platform | Cache Size | File Downloads) | with GAV | GAV Signatures |
|
|
|
|
|
TZ 150 | 2,048 | 2,048 | 100 | 4,500 |
Series |
|
|
|
|
|
|
|
|
|
TZ 170 | 6,144 | 6,144 | 100 | 4,500 |
Series |
|
|
|
|
|
|
|
|
|
PRO 1260 | 6,144 | 6,144 | 100 | 4,500 |
|
|
|
|
|
PRO 2040 | 32,768 | 16,384 | 300 | 25,000 |
|
|
|
|
|
PRO 3060 | 131,072 | 65,536 | 1,000 | 25,000 |
|
|
|
|
|
PRO 4060 | 524,288 | 131,072 | 1,500 | 25,000 |
|
|
|
|
|
PRO 5060 | 750,000 | 393,216 | 3,000 | 25,000 |
|
|
|
|
|
Disabling the SonicWALL GAV/IPS Engine
In the unlikely event that SonicWALL Gateway
To disable the SonicWALL GAV/IPS engine, perform the following steps:
Step 1 Select the Firewall > Advanced page.
Step 2 Select the Disable Gateway AV and IPS Engine (increases maximum SPI connections) checkbox. This presents an alert informing you that the SonicWALL security appliance must be rebooted for the change to take effect.
Step 3 Restart your SonicWALL security appliance.
Protocol Handling
SonicWALL GAV functionality supports the following protocols: HTTP, SMTP, IMAP, POP3, FTP and the scanning of generic TCP streams for viruses.
If malicious traffic is detected, appropriate actions are taken based on the protocol. For generic TCP streams, the traffic is dropped and the connection is reset. If so configured, an encrypted and hashed message explaining the action is sent to the user's Global Security Client (requires version
2.0or higher) and to the user's 'Security Action Notification Applet', and displayed to the user if either application is active. Application level awareness of the type of protocol that was transporting the violation allows for very specific actions to be taken to gracefully handle the rejection of the payload:
SonicWALL TZ 180 TotalSecure | 9 |