Priorities Of Nat Rules; Configuring The Session Settings - Cisco ISA500 Series Administration Manual

Integrated security appliance
Hide thumbs Also See for ISA500 Series:
Table of Contents

Advertisement

Firewall

Configuring the Session Settings

Configuring the Session Settings
STEP 1
STEP 2
Cisco ISA500 Series Integrated Security Appliance Administrator Guide
RxPkt: The number of received packets.
Tx Traffic (bytes): The volume in bytes of transmitted traffic.
Rx Traffic (bytes): The volume in bytes of received traffic.

Priorities of NAT Rules

If multiple NAT features operate simultaneously on the security appliance:
For pre-routing, the security appliance first matches up with the advanced
NAT rules, and then matches up with the static NAT, port forwarding, and
port triggering rules.
For post-routing, the security appliance first matches up with the advanced
NAT rules, and then matches up with the static NAT and dynamic PAT rules.
Use the Session Settings page to configure the maximum number of connection
sessions. When the connnection table is full, the new sessions that access the
security appliance are dropped.
Click Firewall -> Session Settings.
The Session Settings window opens.
Enter the following information:
Current All Connections: Displays the number of all current connected
sessions. Click Disconnect All to clear up all connected sessions.
Maximum Connection: Limits the number for TCP and UDP connections.
The default is 60000.
TCP Timeout: Enter the timeout value in seconds for TCP session. Inactive
TCP sessions are removed from the session table after this duration. The
default is 1200 seconds.
UDP Timeout: Enter the timeout value in seconds for UDP session. Inactive
UDP sessions are removed from the session table after this duration. The
default is 180 seconds.
6
200

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Isa550Isa570Isa570wIsa550w

Table of Contents