
FIREWALL
Parameter Defaults Description
H.323 data channel idle timeout
DoS Detect Criteria
Total incomplete
TCP/UDP sessions HIGH
180 sec | The length of time for which an H.323 session |
| will be managed if there is no activity. |
300 sessions Defines the rate of new unestablished sessions that will cause the software to start deleting
Total | 250 sessions | Defines the rate of new unestablished sessions |
incomplete |
| that will cause the software to stop deleting |
TCP/UDP |
| |
sessions LOW |
|
|
Incomplete | 250 sessions | Maximum number of allowed incomplete TCP/ |
TCP/UDP |
| UDP sessions per min. |
sessions (per |
|
|
min) HIGH |
|
|
Incomplete
TCP/UDP sessions (per min) LOW
Maximum incomplete
TCP/UDP sessions number from same host
Incomplete
TCP/UDP sessions detect sensitive time period
200 sessions Set this to 0 as no minimum setting is required and setting it to anything higher will adversly affect performance.
10Maximum number of incomplete TCP/UDP sessions from the same host.
300 msec Length of time before an incomplete TCP/UDP session is detected as incomplete.
Maximum | 30 | Maximum number of |
| packets from the same host. | |
fragmentation |
|
|
packet number |
|
|
from same host |
|
|
10000 msec | Length of time before a | |
fragmentation |
| session is detected as |
detect sensitive |
|
|
time period |
|
|
Flooding cracker | 300 sec | Length of time from detecting a flood attack to |
block time |
| blocking of the attack. |