664
Field descriptions
Assets field descriptions
Network Interface Properties—General tab
The Network Interface Properties dialog box lets you configure security features, filters, and routing
for the selected network interface.
Associated tasks
The tasks that you can perform with this tab include:
■
“Enabling port scan detection”
■
■
■
“Configuring SYN flood protection”
■
“Enabling SYN flood protection”
Table D-113
Network Interface Properties—General tab
Field
Description
Interface
Identifies the interface.
This field is read-only.
Type
Indicates whether the interface type is Inside or Outside.
This field is read-only.
Logical Name
Logical name of the network interface.
You can modify this name; if the name is already in use in rules, it is automatically
changed in the rules.
The maximum length is 256 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), dashes (-), and underscores
(_).
Do not include spaces in the name. The characters @,!,#,$,%,
^
,&,*,<,> and other
reserved characters are also invalid.
Port Scan detection
Indicates whether port scan detection is enabled on this interface.
This option is checked by default on outside interfaces and unchecked by default on
inside interfaces.
Port scan detection registers a message when an attempt is made to connect to an
unused or disallowed port on an interface. The message logs the source and
attempted destination of the connection.
Spoof protection
Indicates whether spoof protection is enabled on this interface.
This option is checked by default.
Spoof protection associates selected network entities with specific interfaces. This
lets the security gateway know whether a packet has arrived at an expected
interface. When the interface at which packets arrive is not the expected interface,
they are dropped.
Provide recursion and expose
private DNS information
Indicates whether recursion and the exposure of private DNS information is
enabled on this interface.
When enabled, private DNS information is exposed on this interface.
This option is unchecked by default on outside interfaces and checked by default on
inside interfaces.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...