Checksum Validation Parameters - Symantec 10521146 - Network Security 7120 Administration Manual

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

168 Detecting
Configuring sensor detection

Checksum validation parameters

Traffic Mode
Traffic Mode regulates asymmetric routing in the following modes:
Simplex:
The sensor predominantly monitors the client-to-server side of the
connection.
Duplex:
The sensor monitors both the client-to-server and the server-to-client sides
of the connection.
The default is set to duplex, and Symantec Network Security generally performs
best in this mode. Change to simplex only under specific conditions or for
specific environments. Set this parameter during deployment, when you decide
which mode to use.
Note: Restart the sensor for changes to this parameter to take effect.
Caution: Switching this parameter to simplex has a broad effect on a number of
Symantec Network Security features. Do not change this without a thorough
understanding of the effects.
Note: If a sensor in duplex mode receives a lot of simplex traffic, it displays an
operational log message indicating that the flow records have been recycled, and
that a large number of them have detected packets in only one direction.
The following parameters enable or disable the ability to validate checksums for
a variety of traffic types.
Enable IPv4 Header Checksum Validation
Enable IPv4 Header Checksum Validation serves as the on/off switch enabling
the sensor to validate IPv4 header checksums. An IPv4 header unit generates a
checksum, and transmits it with the unit. The sensor generates a second
checksum and compares them. Matching checksums confirm that the sensor
received the complete transmission.
By default, this parameter is enabled. If you installed a Network Security
software node on a computer with no checksum capability, you may choose to
disable this parameter and enhance performance. 7100 Series appliances have
checksum capability.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents