Page 141 / 351
                                                    Scroll up to view Page 136 - 140
                                                
                    
141
Security
•
UDP no-activity time-out
: The time in seconds after which a UDP session will be ter-
minated, if there is no traffic on the session.
•
TCP no-activity time-out
: The time in seconds after which an TCP session will be ter-
minated, if there is no traffic on the session.
•
Exposed Addresses
: The hosts specified in Exposed Addresses will be allowed to 
receive inbound traffic even if there is no corresponding outbound traffic. This is active 
only if NAT is disabled on a WAN interface.
•
Stateful Inspection Options
: Enable and configure stateful inspection on a WAN inter-
face.
Exposed Addresses
You can specify the IP addresses you want to expose by clicking the 
Exposed 
ad
dresses
link.
 
                 
                                
                    
                        Page 142 / 351
                                            
                    
142
Add, Edit, or delete exposed addresses options are active only if NAT is disabled on a WAN 
interface. The hosts specified in exposed addresses will be allowed to receive inbound traf-
fic even if there is no corresponding outbound traffic.
•
Start Address
: Start IP Address of the exposed host range.
•
End Address
: End IP Address of the exposed host range
•
Protocol
: Select the Protocol of the traffic to be allowed to the host range from the pull-
down menu. Options are Any, TCP, UDP, or TCP/UDP.
•
Start Port
: Start port of the range to be allowed to the host range. The acceptable 
range is from 1 - 65535
•
End Port
: Protocol of the traffic to be allowed to the host range. The acceptable range 
is from 1 - 65535 
You can add more exposed addresses by clicking the 
Ad
d more Exposed Ad
dresses
link. A list of previously configured exposed addresses appears.
 
                 
                                
                    
                        Page 143 / 351
                                            
                    
143
Security
Click the 
Ad
d
button to add a new range of exposed addresses.
You can edit a previously configured range by clicking the 
Edit
button, or delete the entry 
entirely by clicking the 
Delete
button.
All configuration changes will trigger the Alert Icon. 
Click on the Alert icon.
This allows you to validate the configuration and reboot the Gateway.
Click the 
Sa
ve and Restar
t
link. You will be asked to confirm your choice, and the Gate-
way will reboot with the new configuration.
 
                 
                                
                    
                        Page 144 / 351
                                            
                    
144
Stateful Inspection Options
Stateful Inspection Parameters are active on a WAN interface only if you enable them on 
your Gateway.
•
Stateful Inspection
: To enable stateful inspection on this WAN interface, check the 
checkbox.
•
Default Mapping to Router
: This is disabled by default. This option will allow the 
router to respond to traffic received on this interface, for example, ICMP Echo requests.
☛ 
NOTE:
If Stateful Inspection is enabled on a WAN interface 
Default Mapping to 
Router
must be enabled to allow inbound VPN terminations to the router.
•
TCP Sequence Number Difference
: Enter a value in this field. This value represents 
the maximum sequence number difference allowed between subsequent TCP packets. 
If this number is exceeded, the packet is dropped. The acceptable range is 0 – 65535. 
A value of 0 (zero) disables this check.
•
Deny Fragments
: To enable this option, which causes the router to discard fragmented 
packets on this interface, check the checkbox. 
 
                 
                                
                    
                        Page 145 / 351
                                            
                    
145
Security
Open Ports in Default Stateful Inspection Installation 
Port
Protocol
Description
LAN (Private) 
Interface
WAN (Public) 
Interface
23
TCP
telnet
Yes
No
53
UDP
DNS
Yes
No
67
UDP
Bootps
Yes
No
68
UDP
Bootpc
Yes
No
80
TCP
HTTP
Yes
No
137
UDP
Netbios-ns
Yes
No
138
UDP
Netbios-dgm
Yes
No
161
UDP
SNMP
Yes
No
500
UDP
ISAKMP
Yes
No
520
UDP
Router
Yes
No