13.9. Miscellaneous Settings
UDP Source Port 0
How to treat UDP packets with source port 0.
Default: DropLog
Port 0
How to treat TCP/UDP packets with destination port 0 and TCP packets with source port 0.
Default: DropLog
Watchdog Time
Number of non-responsive seconds before watchdog is triggered (0=disable).
Default: 180
Flood Reboot Time
As a final way out, NetDefendOS automatically reboots if its buffers have been flooded for a long
time. This setting specifies this amount of time.
Default: 3600
Max Connections
Packet re-assembly collects IP fragments into complete IP datagrams and, for TCP, reorders
segments so that they are processed in the correct order and also to keep track of potential segment
overlaps and to inform other subsystems of such overlaps. The associated settings limit memory
used by the re-assembly subsystem.
This setting specifies how many connections can use the re-assembly system at the same time. It is
expressed as a percentage of the total number of allowed connections. Minimum 1, Maximum 100.
Default: 80
Max Memory
This setting specifies how much memory that the re-assembly system can allocate to process
packets. It is expressed as a percentage of the total memory available. Minimum 1, Maximum 100.
Default: 3
Max Pipe Users
The maximum number of pipe users to allocate. As pipe users are only tracked for a 20th of a
second, this number usually does not need to be anywhere near the number of actual users, or the
number of statefully tracked connections. If there are no configured pipes, no pipe users will be
allocated, regardless of this setting. For more information about pipes and pipe users, see
Section 10.1, “Traffic Shaping”.
Default: 512
13.9. Miscellaneous Settings
Chapter 13. Advanced Settings
532
Summary of Contents for DFL-1600 - Security Appliance
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27 ...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79 ...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146 ...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227 ...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241 ...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339 ...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360 ...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382 ...
Page 386: ... The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386 ...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439 ...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450 ...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488 ...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503 ...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510 ...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533 ...