System Configuration 3-3
Stateful Inspection
Stateful inspection is a security feature that prevents unsolicited inbound access when NAT is disabled.
Stateful inspection can be enabled on a Connection Profile whether NAT is enabled or not. You can configure
UDP and TCP “no-activity” periods that will also apply to NAT time-outs if stateful inspection is enabled on the
interface. Stateful Inspection parameters are active on a WAN interface only if enabled on your Gateway.
UDP no-activity time-out: The time in seconds after which a UDP session will be terminated, if there is no
traffic on the session.
TCP no-activity time-out: The time in seconds after which an TCP session will be terminated, if there is no
traffic on the session.
DoS Detect: If you toggle this option to Yes, the device will monitor packets for Denial of Ser vice (DoS)
attack. Offending packets may be discarded if it is determined to be a DoS attack.
Add Exposed Address List: Accesses the Add Exposed Address List screen. See “Add Exposed Address
List” on page 3-3.
Exposed Address Associations: Accesses the Exposed Address Associations screen. See “Exposed
Address Associations” on page 3-7. The hosts specified in Exposed addresses will be allowed to receive
inbound traffic even if there is no corresponding outbound traffic. This is active only if NAT is disabled on a
WAN interface. An Exposed Address List can be associated with a Connection Profile only if NAT is disabled
and Stateful Inspection is enabled on the profile.

Add Exposed Address List

You can specify the IP addresses you want to expose by selecting Add Exposed Address List from the Stateful
Inspection menu and pressing Return.
Stateful Inspection
UDP no-activity timeout (sec): 180
TCP no-activity timeout (sec): 14400
DoS Detect: No
Add Exposed Address List...
Exposed Address Associations...
Return/Enter goes to new screen.
Return/Enter to configure Xposed IP addresses.