Appendix J. Session Limit and Session Log
186
Appendix J. Session Limit and Session Log
Session Limit
To prevent ill-behaved clients or malicious software from using up system’s connection resources,
administrators will have to restrict the number of concurrent sessions that a user can establish.
¾
The maximum number of concurrent sessions (TCP and UDP) for each user can be specified in the Global
policy, which applies to authenticated users, users on a non-authenticated port, privileged users, and
clients in DMZ zones.
¾
When the number of a user’s sessions reaches the session limit (a choice of Unlimited, 10, 25, 50, 100,
200, 350, and 500), the user will be implicitly suspended upon receipt of any new connection request. In
this case, a record will be logged to the Syslog server specified in the
Email & SYSLOG.
.
¾
Since this basic protection mechanism may not be able to protect the system from all malicious DoS
attacks, it is strongly recommended to build some immune capabilities (such as IDS or IPS solutions) in the
network deployment to protect the network in daily operation.
Session Log
The system can record connection details of each user accessing the Internet. In addition, the log data can be
sent out to a specified Syslog Server, Email Box or FTP Server based on pre-defined interval time.
¾
The following table shows the fields of a session log record.
Field Description
Date and Time
The date and time that the session is established
Session Type
[New]: This is the newly established session.
[Blocked]: This session is blocked by a Firewall rule.
Username
The account name (with postfix) of the user; It shows “N.A.” if the user
or device does not need to log in with a username. For example, the
user or device is on a non-authenticated port or on the privileged
MAC/IP list. Note: Only 31 characters are available for the
combination of Session Type plus Username. Please change the
account name accordingly, if the name is not identifiable in the record.
Protocol
The communication protocol of session: TCP or UDP
MAC
The MAC address of the user’s computer or device
SIP
The source IP address of the user’s computer or device
SPort
The source port number of the user’s computer or device
DIP
The destination IP address of the user’s computer or device
DPort
The destination port number of the user’s computer or device
Содержание DSA-3600
Страница 1: ...DSA 3600 User Guide Version DSA 3600 3 00 December 2007 ...
Страница 6: ......
Страница 22: ...Chapter 4 Web Interface Configuration 16 ...
Страница 24: ...Chapter 4 Web Interface Configuration 18 ...
Страница 39: ...Chapter 4 1 System 33 An example of Template Login Page ...
Страница 121: ...Chapter 4 4 Network 115 ...
Страница 123: ...Chapter 4 5 Status 117 4 5 1 System This section provides an overview of the system administration ...
Страница 143: ...Chapter 4 6 Tools 137 Figure 4 6 1a An example using Tag Based service zones ...
Страница 162: ...Appendix C Proxy Configuration 156 setting ...