
CONFIGURATION PARAMETERS
•DoS Criteria and Port Scan Criteria
Set up DoS and port scan criteria in the spaces provided (as shown below).
Parameter | Defaults | Description |
|
|
|
Total incomplete | 300 | Defines the rate of new unestablished sessions |
TCP/UDP sessions | sessions | that will cause the software to start deleting |
HIGH |
| |
Total incomplete | 250 | Defines the rate of new unestablished sessions |
TCP/UDP sessions | sessions | that will cause the software to stop deleting half- |
LOW |
| open sessions. |
Incomplete | 250 | Maximum number of allowed incomplete |
TCP/UDP sessions | sessions | TCP/UDP sessions per minute. |
(per min) HIGH |
|
|
Incomplete | 200 | Minimum number of allowed incomplete |
TCP/UDP sessions | sessions | TCP/UDP sessions per minute. |
(per min) LOW |
|
|
Maximum incomplete | 10 | Maximum number of incomplete TCP/UDP |
TCP/UDP sessions |
| sessions from the same host. |
number from same |
|
|
host |
|
|
Incomplete 300 TCP/UDP sessions msec detect sensitive time period
Maximum
Length of time before an incomplete TCP/UDP session is detected as incomplete.
Maximum number of
Length of time before a
Flooding cracker | 300 | Length of time from detecting a flood attack to |
block time | second | blocking the attack. |
|
|
|
Note: The firewall does not significantly affect system performance, so we advise enabling the prevention features, and leaving them at the default settings to protect your network.