111
7.3. Session Limit & Session Log
Session Limit
To prevent ill-behaved clients or malicious software from using up system’s connection resources,
administrators will have to restrict the number of concurrent sessions that a user can establish.
The maximum number of concurrent sessions (TCP and UDP) for each user can be specified in each
Policy profile, which applies to authenticated users, users on a non-authenticated port, privileged users,
and clients in DMZ zones will follow Global policies session limit.
When the number of a user’s sessions reaches the session limit (a choice of Unlimited, 10, 25, 50, 100,
200, 350, and 500), the user will be implicitly suspended upon receipt of any new connection request. In
this case, a record will be logged to the SYSLOG server specified in the
Email & SYSLOG.
Since this basic protection mechanism may not be able to protect the system from all malicious DoS
attacks, it is strongly recommended to build some immune capabilities (such as IDS or IPS solutions) in the
network deployment to protect the network in daily operation.
Session Log
The system can record connection details of each user accessing the Internet called session log. The log data
can be sent out to a specified SYSLOG Server, Email Box or FTP Server based on pre-defined interval time.
The following table shows the fields of a session log record.
Field
Description
Date and Time
The date and time that the session is established
Session Type
[New]: This is the newly established session.
[Blocked]: This session is blocked by a Firewall rule.
Username
The account name (with postfix) of the user; It shows “N.A.” if the user
or device does not need to log in with a username. For example, the
user or device is on a non-authenticated port or on the privileged
MAC/IP list. Note: Only 31 characters are available for the
combination of Session Type plus Username. Please change the
account name accordingly, if the name is not identifiable in the record.
Protocol
The communication protocol of session: TCP or UDP
MAC
The MAC address of the user’s computer or device
SIP
The source IP address of the user’s computer or device
SPort
The source port number of the user’s computer or device
DIP
The destination IP address of the user’s computer or device
DPort
The destination port number of the user’s computer or device
Содержание WHG-311
Страница 1: ...LevelOne Secure WLAN Controller WHG 311 315 401 505 515 707 User Manual...
Страница 25: ...25 WHG Controller in a Business Headquarter WHG Controller in a Hotel Capable of integrating with DSLAM and PMS...
Страница 61: ...61...
Страница 67: ...67...
Страница 103: ...103...
Страница 118: ...118...
Страница 162: ...162 AP status Client List and WDS List information listed are collected from the remote AP via SNMP...
Страница 205: ...205 13 1 3 HW View Hardware Status go to Status HW This tab page displays the system s hardware usage information...
Страница 232: ...232 Custom Pages Login Page Uploaded Page Choose Uploaded Page and upload a login page to the built in HTTP server...
Страница 250: ...250 price duration serial number number is account s n...
Страница 252: ...252...
Страница 268: ...268...
Страница 273: ...273 4 Select root certification and then click View Certificate 5 Click Install Certificate...
Страница 275: ...275 8 Click Finish...
Страница 307: ...307 P N VWHG50020110601...