207
Defining your security environment
Controlling full application inspection of traffic
To enable support for loose interface connections
1
In the SGMI, in the left pane, under Assets, click
Proxies
.
2
In the right pane, on the Proxies tab, click the H.323 proxy, and then click
Properties
.
3
In the Proxy Properties dialog box, on the Security tab, under the Available list box, select the
interface on which you want to enable loose security, and then click the right-arrow >> button,
which moves it to the Selected list box.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
None.
Modifying the timeout period to keep inactive H.323 connections open
By default, H.323 connections timeout after an inactivity period of 300 seconds (5 minutes). If you find
that connections are timing out too quickly for your environment, you can use this section’s procedure
to increase the period of time that inactive connections stay open. Similarly, if the inactivity period is
too long, you can use the procedure in this section to reduce that period of time.
Prerequisites
Complete the following task before beginning this procedure.
■
“Configuring access for Internet-based communications”
To modify the timeout period to keep inactive H.323 connections open
1
In the SGMI, in the left pane, under Assets, click
Proxies
.
2
In the right pane, on the Proxies tab, click the H.323 proxy, and then click
Properties
.
3
In the Proxy Properties dialog box, on the Miscellaneous tab, in the Timeout text box, type the new
timeout value.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
None.
Enabling socket linger
This feature is disabled by default. Generally, you should not enable socket linger. If enabled, socket
closing could fail to flush outstanding data. This can affect overall performance by leaving several
sockets in a lingering state.
Prerequisites
Complete the following task before beginning this procedure.
■
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...