Manage The Application Level Gateway For Sip Sessions - NETGEAR FVS318N Reference Manual

Prosafe wireless-n 8-port gigabit vpn firewall
Hide thumbs Also See for FVS318N:
Table of Contents

Advertisement

2.
Select the Yes radio button under Do you want to enable Session Limit?
3.
Enter the settings as explained in the following table:
Table 30. Session Limit screen settings
Setting
Session Limit
User Limit Parameter
User Limit
Total Number of
Packets Dropped due
to Session Limit
Session Timeout
TCP Timeout
UDP Timeout
ICMP Timeout
4.
Click Apply to save your settings.

Manage the Application Level Gateway for SIP Sessions

The application level gateway (ALG) facilitates multimedia sessions such as voice over IP
(VoIP) sessions that use the Session Initiation Protocol (SIP) across the firewall and provides
support for multiple SIP clients. ALG support for SIP is disabled by default.
To enable ALG for SIP:
1.
Select Security > Firewall > Advanced. The Advanced screen displays:
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Description
From the User Limit Parameter drop-down list, select one of the following options:
• Percentage of Max Sessions. A percentage of the total session connection
capacity of the wireless VPN firewall.
• Number of Sessions. An absolute number of maximum sessions.
Enter a number to indicate the user limit. Note the following:
• If the User Limit Parameter is set to Percentage of Max Sessions, the number
specifies the maximum number of sessions that are allowed from a single-source
device as a percentage of the total session connection capacity of the wireless
VPN firewall. (The session limit is per-device based.)
• If the User Limit Parameter is set to Number of Sessions, the number specifies
an absolute value.
Note:
Some protocols such as FTP and RSTP create two sessions per connection,
which should be considered when configuring a session limit.
This is a nonconfigurable counter that displays the total number of dropped packets
when the session limit is reached.
For each protocol, specify a time-out in seconds. A session expires if no data for
the session is received for the duration of the time-out period. The default time-out
periods are 1800 seconds for TCP sessions, 120 seconds for UDP sessions, and
60 seconds for ICMP sessions.
IPv4 Firewall Protection
135

Advertisement

Table of Contents
loading

Table of Contents