703
Field descriptions
Assets field descriptions
Proxy Properties: FTP—Timeout tab
The Timeout tab lets you specify the timeout for data transfers. If no data is received by the FTP
application proxy during this period of time, then the FTP session times out.
Associated tasks
The task that you can perform with this tab is:
■
“Modifying the timeout period for inactive FTP connections”
Proxy Properties: FTP—Port Restrictions tab
The Port Restrictions tab lets you control access to FTP ports.
Caution:
There are known attacks against the lower level ports (0 - 1023), which are sometimes also
referred to as the privileged or reserved ports. Consider this before allowing data connections to all
ports.
Associated tasks
The task that you can perform with this tab is:
■
Proxy Properties: FTP—Description tab
Optionally, provides an extended description. This information is useful to help track changes or it can
be used as criteria for searches.
The maximum length is 20,000 alphanumeric characters.
Table D-161
Proxy Properties: FTP—Timeout tab
Field
Description
Data transfer timeout for data
connections (seconds)
Sets a time limit on a connection if it remains inactive. After this period of time,
the connection is automatically closed.
The default value is 900 seconds (15 minutes).
Table D-162
Proxy Properties: FTP—Port Restrictions tab
Field
Description
Allow data connections to all
ports
An FTP client can connect to any port.
Block data connections to all ports
below 1024
Blocks connection attempts to all privileged ports (0 - 1023).
Block data connections to all
named ports below 1024
Blocks connection attempts to any defined privileged port. For example, FTP is
normally defined on port 21, so checking this option blocks access to that
port, but wouldn’t block access to a port such as 781, which is undefined.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...