Appendix J. Session Limit And Session Log - D-Link DSA-3600 User Manual

Multi-service business gateway
Hide thumbs Also See for DSA-3600:
Table of Contents

Advertisement

Appendix J. Session Limit and Session Log

Session Limit
To prevent ill-behaved clients or malicious software from using up system's connection resources,
administrators will have to restrict the number of concurrent sessions that a user can establish.
The maximum number of concurrent sessions (TCP and UDP) for each user can be specified in the Global
policy, which applies to authenticated users, users on a non-authenticated port, privileged users, and
clients in DMZ zones.
When the number of a user's sessions reaches the session limit (a choice of Unlimited, 10, 25, 50, 100,
200, 350, and 500), the user will be implicitly suspended upon receipt of any new connection request. In
this case, a record will be logged to the Syslog server specified in the Email & SYSLOG..
Since this basic protection mechanism may not be able to protect the system from all malicious DoS
attacks, it is strongly recommended to build some immune capabilities (such as IDS or IPS solutions) in the
network deployment to protect the network in daily operation.
Session Log
The system can record connection details of each user accessing the Internet. In addition, the log data can be
sent out to a specified Syslog Server, Email Box or FTP Server based on pre-defined interval time.
The following table shows the fields of a session log record.
Field
Date and Time
Session Type
Username
Protocol
MAC
SIP
SPort
DIP
DPort
Description
The date and time that the session is established
[New]: This is the newly established session.
[Blocked]: This session is blocked by a Firewall rule.
The account name (with postfix) of the user; It shows "N.A." if the user
or device does not need to log in with a username. For example, the
user or device is on a non-authenticated port or on the privileged
MAC/IP list. Note: Only 31 characters are available for the
combination of Session Type plus Username. Please change the
account name accordingly, if the name is not identifiable in the record.
The communication protocol of session: TCP or UDP
The MAC address of the user's computer or device
The source IP address of the user's computer or device
The source port number of the user's computer or device
The destination IP address of the user's computer or device
The destination port number of the user's computer or device
Appendix J. Session Limit and Session Log
186

Advertisement

Table of Contents
loading

Table of Contents