546
Advanced system settings
Configuring advanced options
connection_rate.interval
Period of time (in seconds) in which the number of connections from
a single source IP address must exceed the connection limit defined
by connection_rate.limit.
The default value is 30.
connection_rate.limit
If the number of connections from a source IP address exceeds this
limit, that IP address is blocked.
The default value is 1.
dnsd.delegation_beats_forwarders
If this is set to false, the DNS proxy ignores delegation information it
may have to find an answer, and always asks the forwarder for the
answer. This is inefficient.
The default value is false.
dnsd.log_all_unprocessed_queries
Enables verbose logging of all queries that the DNS proxy doesn’t
handle.
The default value is false.
dnsd.log_connection_info
Enables detailed logging of DNS connections.
The default value is false.
dnsd.log_successful_name_resolutions
Enables detailed logging of all successful queries.
The default value is false.
httpd.allow_idn_to_ace
When a connection is transparent, the client normally resolves the
the domain name requested in the URL first before making the
connection. When the domain is international (IDN), the client must
convert it to its ASCII equivalent (ACE) before it can query DNS for
resolution. If the client’s Web browser is set to use a proxy (such as
the security gateway), it is the proxy’s responsibility to convert the
the IDN to its ACE. Setting this option to true instructs the HTTP
proxy to do this conversion.
The default value is false.
httpd.allow_url_illegal_char
Some international Web sites use non-ASCII characters in their
URLs. These URLs are normally blocked by the HTTP proxy because
it is a protocol violation. When this advanced option is set to true,
the HTTP proxy will not block a URL if it contains a non-ASCII
character.
The default value is false.
httpd.responseutf8
When set to 1, the HTTP proxy converts the URL in the antivirus
error message to UTF-8 before sending it to the client.
The default value is 0.
idssym.backdoor_blaster_ports
Ports running traffic where the Blaster worm is expected.
idssym.backdoor_bo2k_ports
Ports running traffic where the default Back Orifice 2000 is expected.
idssym.backdoor_netbus_ports
Ports running traffic where the netbus trojan is expected.
idssym.dameware_ports
Ports running DameWare traffic.
idssym.dhcp_client_port
Ports running DHCP client-bound traffic.
idssym.dhcp_server_port
Ports running DHCP server-bound traffic.
idssym.emule_ports
Ports normally related to Emule traffic.
Table A-1
Advanced options (Continued)
Option name
Description
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...