Create Single Layer 2 Firewall elements
Single Layer 2 Firewall elements represent Layer 2 Firewalls that consist of one physical device.
Single Layer 2 Firewall elements can be later converted to Layer 2 Firewall Clusters.
For more details about the product and how to configure features, click Help or press F1.
Steps
Next steps
You are now ready to configure interfaces for the Single Layer 2 Firewall.
Engine Editor – common elements
Use the Engine Editor toolbar options to save changes to the engine configuration and refresh a policy on the engine. These options are shown no matter which branch of the Engine Editor you have open.
Option | Definition |
---|---|
Save | Validates and saves the changes. The Engine Editor tab stays open. |
Save and Refresh | Validates and saves the changes, and refreshes the policy on the engine. The Engine Editor tab stays open. |
Tools | Validate — Validates the changes without saving them. The Engine Editor tab stays open. |
Engine Editor – General
Use this branch to change general engine settings for clustering, engine tester configuration, and administrator permissions.
Option | Definition |
---|---|
Name | The name of the element. |
Log Server | Specifies the Log Server to which the engine sends the event data. |
Version
(Not available for clusters) |
The version of the Forcepoint Next Generation Firewall software. Not editable. |
Status
(Not available for clusters) |
Shows the configuration status of the engine. Not editable. |
DNS IP Addresses
(Optional) |
Specifies the IP addresses of the DNS servers that the engine uses to resolve:
(Firewall/VPN role only) For DNS relay, specifies the IP addresses of external DNS servers to which the engine forwards DNS requests from clients in the internal network. If you have configured at least one Physical Interface with a dynamic IP address or one static NetLink with a DNS IP address, the default value of the DNS IP Addresses field is The engine uses NetLink-specific DNS IP addresses. Note: Specifying a value for the DNS IP Addresses field overrides
NetLink-specific DNS IP addresses defined in the NetLink properties.
|
Add | Adds one or more IP addresses using the following options:
|
Remove | Removes one or more selected IP addresses from the DNS IP Addresses list. |
Location | Specifies the location for the engine if there is a NAT device between the engine and other SMC components. |
Category (Optional) |
Includes the element in predefined categories. Click Select to select a category. |
Tools Profile | Adds custom commands to the engine's right-click menu.
|
Comment (Optional) |
A comment for your own reference. |
Add IP Address dialog box
Use this dialog box to manually add DNS IP addresses to the engine.
Option | Definition |
---|---|
Enter a Manual IP Address | Adds the IP address of the DNS server. |
Engine Editor – General – Tester
Use this branch to configure the tester to run various checks on the engines and initiate responses based on the success or failure of these tests.
Option | Definition |
---|---|
Global Settings section | |
Alert Interval | Specifies the time in minutes the system waits before sending a new alert when the same test keeps failing repeatedly. The default value is 60 minutes.
Note: If the interval is too short, the alerts can overload the system or the alert recipient.
|
Delay After | Specifies the time in seconds that the engine waits before it resumes running the tests after the listed events. The delays prevent false test failures
that can occur due to variations in how quickly different processes and subsystems can start and stop.
Note: The maximum value for all options is 1800.
|
Auto Recovery
(Clusters and Master NGFW Engines only) |
When selected, the engine automatically goes back online when a previously failed test completes successfully. Note: Run the test in both online and
offline states if you activate this option.
|
Boot Recovery | When selected, the engine automatically goes back online after a reboot if all offline tests report a success. |
Global Node Selection for Engine Tests | |
Search | Opens a search field for the selected element list. |
Tools | Refresh View — Refreshes the list of elements. |
Active | Shows whether the node is included in the tests that have been configured for the engine. Deselect to exclude a node from all engine tests. Tip: If you select ALL for the Node setting in the test properties, you can use the Global Node Selection
for Engine Tests table to exclude a specific node from the test.
|
Name | Specifies the name of the node. |
Node | Specifies the node ID. |
Set to Default | Returns tester changes to the default settings. |
Option | Definition |
---|---|
Engine Tests section | |
Search | Opens a search field for the selected element list. |
Tools | Refresh View — Refreshes the list of elements. |
Name | Specifies the name of the test. |
Active | Shows whether the test is active. Deselect to deactivate a test. |
Node | Specifies whether the test applies to all nodes or a selected node. |
Interval | Specifies how often the test is run. The minimum interval is one second and the maximum is 86400 (one day). Note: We recommend a minimum interval of four
seconds. Running a test too frequently can increase overhead.
|
States | Shows the engine states on which the test is run. |
Action | Specifies which action is taken if the test fails, and which type of notification is sent. |
Parameters | Specifies more parameters for the test. |
Add | Adds the test to the test entry table:
|
Edit | Allows you to change the test properties. |
Remove | Removes the test from the test entry table. |
Engine Editor – General – Permissions
Use this branch to change permissions settings to control the administration of the engines.
Option | Definition |
---|---|
Administrator Permissions section | |
Add | Adds an Access Control List. |
Remove | Removes the selected Access Control List. |
Add Permission | Adds a permission to the Administrator Permissions table. |
Remove Permission | Removes the selected permission from the Administrator Permissions table. |
Option | Definition |
---|---|
Local Administrators section | |
Administrator | Specifies the name of the local administrator, if local administrators have been defined for the engine. |
Info | Specifies whether executing root-level commands with the sudo tool is allowed for the Local Administrator. |
Option | Definition |
---|---|
Policies section | |
Allowed Policies | Shows the policies that are allowed to be installed on the engine. |
Add | Adds the element to the Allowed Policies list. |
Set to Any | Allows the installation of any policy. |
Remove | Removes the selected element from the Allowed Policies list.. |
Engine Editor – General – SNMP
Use this branch to enable the NGFW Engine to send SNMP traps.
Option | Definition |
---|---|
SNMP Agent | Enables the NGFW Engine to send SNMP traps.
|
SNMP Location | Specifies the SNMP location string that is returned on queries to the SNMPv2-MIB or SNMPv2-MIB-sysLocation object. |
SNMP Engine ID (Single NGFW Engines and SNMPv3 only) |
A unique identifier for the NGFW Engine that is used by the SNMP agent. The engine ID is used with a hash function to generate keys for authentication and encryption of SNMPv3 messages. If you do not specify the SNMP engine ID, an SNMP engine ID is automatically generated. |
Listening IP Addresses | The IPv4 or IPv6 addresses from which SNMP traps are sent. |
Add | Adds an interface and its IP addresses to the list. Opens the Select dialog box. |
Remove | Removes the selected interface and its IP addresses from the list. |
Engine Editor – General – NTP
Use this branch to enable NTP time synchronization and select NTP servers for the NGFW Engine.
Option | Definition |
---|---|
Enable time synchronization from NTP server | When selected, the NGFW Engine uses an external NTP server for time synchronization. |
Preferred (Optional) |
When selected, the NGFW Engine uses the specified NTP server by default. |
NTP Server | Lists the available NTP servers. The following right-click actions are available:
|
Engine Editor – Interfaces
Use this branch to configure the necessary interfaces and IP addresses for the engine.
Option | Definition |
---|---|
Add | Adds an interface or IP address of the specified type:
CAUTION: Physical Interfaces for Virtual NGFW Engines are automatically created based on the interface
configuration in the Master NGFW Engine properties. The number of Physical Interfaces depends on the number of interfaces
allocated to the Virtual NGFW Engine in the Master NGFW Engine. Physical
Interfaces that you add to Virtual NGFW Engines might not be valid.
|
Edit | Allows you to change the properties of the interface or IP address. |
Remove | Removes the selected interface or IP address from the table. |
Engine Editor – Interfaces – Interface Options
Use this branch to define which IP addresses are used in particular roles in the engine's system communications.
Option | Definition |
---|---|
Control Interface
(Not Virtual Firewalls) |
Note: We recommend that you do not use the IP address of an Aggregated Link interface as the primary or secondary
control IP address of the engine.
|
Heartbeat Interface
(Clusters and Master NGFW Engines only) |
|
Node-Initiated Contact to Management Server |
When selected, the NGFW Engine opens a connection to the Management Server and maintains connectivity. This option is always used with a dynamic control IP address, so it is always selected if the control IP address is dynamic. If the connection is not open when you command the engine through the Management Client, the command is left pending until the engine opens the connection again. Note: This option is not supported for IPS Clusters, Layer 2 Firewall Clusters, or Virtual NGFW Engines.
|
Identity for Authentication Requests |
The IP address of the selected interface is used when an engine contacts an external authentication server. This option does not affect the routing of the connection with the authentication server. The IP address is used only as a parameter inside the authentication request payload to give a name to the request sender. |
Source for Authentication Requests | By default, specifies the source IP address for authentication requests according to routing. If the authentication requests are sent to an external authentication server over VPN, select an interface with a Node Dedicated IP address that you want to use for the authentication requests. |
Default IP Address for Outgoing Traffic | Specifies the IP address that the engine uses to initiate connections (such as for system communications and ping) through an interface that has no Node Dedicated IP Address. In clusters, you must select an interface that has an IP address defined for all nodes. |
Engine Editor – Interfaces – ARP Entries
Use this branch to manually add ARP entries for IPv4 or neighbor discover entries for IPv6.
Option | Definition |
---|---|
Add ARP Entry | Adds an ARP entry. |
Remove ARP Entry | Removes the selected ARP entry. |
Engine Editor – Routing
Use this branch to view and change the engine's routing configuration.
Option | Definition |
---|---|
Refresh View | Updates the view. |
Expand All | Expands all levels of the routing tree. |
Collapse All | Collapses all levels of the routing tree. |
Display Mode | Changes how the routing configuration is displayed.
|
Default Route | Allows you to view and create default routes that are used when there is no more specific route defined. Note: If the Automatic Default
Route setting is selected in the properties of the interface, default routes are created automatically for interfaces with dynamic IP addresses on
single engines.
|
Add Route | Allows you to add routes to specific destination networks.
|
Query Route | Allows you to search for routes.
|
Engine Editor – Routing – Antispoofing
Use this branch to view and change the engine's antispoofing configuration.
Option | Definition |
---|---|
Refresh View | Updates the view. |
Expand All | Expands all levels of the routing tree. |
Collapse All | Collapses all levels of the routing tree. |
Engine Editor – Add-Ons
Use this branch to view a summary of the add-on features and the status of each feature.
Engine Editor – Add-Ons – TLS Inspection
Use this branch to activate TLS inspection on the engine. You can configure TLS inspection for client or server protection.
Option | Definition |
---|---|
Client Protection Certificate Authority | Select the Client Protection Certificate Authority element for client protection. |
TLS Credentials | Specifies the Server Protection Credentials elements that are used for server protection. Click Add to add an element to the list, or Remove to remove the selected element. |
Check Certificate Revocation | When selected, the NGFW Engine uses CRL or OCSP to check whether certificates have been revoked. |
Decrypt All Traffic | When selected, the NGFW Engine forces all traffic to be decrypted. When the checkbox is not selected, the NGFW Engine either decrypts or does not decrypt traffic according to the settings in TLS Match elements. |
Cryptography Suite Set | Specifies the TLS Cryptography Suite Set element that defines which cryptographic algorithms are allowed
for TLS traffic. Click Select to select an element. |
Engine Editor – Add-Ons – Endpoint Integration
Use this branch to enable endpoint integration on the engine and change the settings for the endpoint client communication.
Option | Definition |
---|---|
> When Endpoint Service is Forcepoint Endpoint Context Agent | |
ECA Listener Certificate | The internal certificate for the NGFW Engine that listens for ECA traffic. The certificate is generated automatically when you save the ECA configuration. |
Signing CA | The internal CA that signed the certificate. |
ECA Configuration | The selected ECA Configuration element. Click Select to select an element. |
Source Networks | Add the networks or zones that contain the clients. The clients located in these networks or zones send endpoint information to this Firewall. Click Add to add an element to the table, or Remove to remove the selected element. |
Destination Networks | Add the networks or zones where outbound connections are going. The clients send endpoint information only if the destination address is located in these networks or zones.
If filtering based on both source address and destination address, both conditions must be met. Click Add to add an element to the table, or Remove to remove the selected element. |
Listening Interfaces | The interfaces or zones the NGFW Engine uses to listen for ECA traffic. Click Add to add an element to the table, or Remove to remove the selected element. |
Listening Port | The port on which the NGFW Engine listens for ECA traffic. |
Export Configuration for Endpoint Clients | Opens the Export ECA Configuration dialog box, where you can export an XML file that contains the ECA configuration and details of all the NGFW Engines that use the same ECA Configuration element. You must first save the NGFW Engine configuration. |
Option | Definition |
---|---|
> When Endpoint Service is McAfee Endpoint Intelligence Agent (McAfee EIA) Note: McAfee Endpoint Intelligence Agent (McAfee EIA) is no longer supported in NGFW version 6.3.0 and later. We recommend
that you use Forcepoint Endpoint Context Agent instead.
|
|
ePO Server | The McAfee ePO server that you want the NGFW Engine to communicate with. Click Select to select an element. |
Endpoint Client Zones or Networks | The networks or zones in which the endpoint clients are located. Click Add to add an element to the table, or Remove to remove the selected element. |
Listen on Interfaces | The interfaces or zones the engine uses to listen for EIA traffic. Click Add to add an element to the table, or Remove to remove the selected element. |
Listening Port | The port on which the NGFW Engine listens for EIA traffic. |
Engine Editor – Add-Ons – User Identification
Use this branch to select a User Identification Service element for the engine. The Forcepoint User ID Service, McAfee Logon Collector, and Integrated User ID Service provide user, group, and IP address information that can be used in transparent user identification.
Option | Definition |
---|---|
User Identification Service | Specifies the Forcepoint User ID Service, the McAfee Logon Collector, or the Integrated User ID Service that associates IP addresses with users for transparent user identification.
The Integrated User ID Service is primarily meant for demonstration purposes and proof-of-concept testing of user identification services.
Note:
McAfee Logon Collector is only supported in Forcepoint NGFW version 5.8 or higher. For Forcepoint NGFW version 6.4 or higher, we recommend that you use the Forcepoint User ID Service.
|
Engine Editor – Add-Ons – Anti-Malware
Use this branch to enable and change settings for anti-malware checks on the engine.
Option | Definition |
---|---|
Enable | Enables anti-malware checks. |
Malware Log Level | The log level for anti-malware events.
|
Alert | When Alert is selected as the log level, specifies the Alert element that is sent. |
Option | Definition |
---|---|
Malware Signature Update Settings section | |
Update Frequency | Defines how often the engine checks for updates to the anti-malware database.
|
Option | Definition |
---|---|
Malware Signature Mirror Settings section | |
Mirror(s) | Enter the URL of the anti-malware database mirror that the engine contacts to update the anti-malware database. Separate multiple addresses with commas. |
Use HTTP Proxy
(Optional) |
Specifies that the engine uses an HTTP proxy to connect to the anti-malware database mirrors. |
Host | The IP address or DNS name of the HTTP proxy. |
Port | The listening port of the HTTP proxy. |
Username | The user name for authenticating to the HTTP proxy. |
Password | The password for authenticating to the HTTP proxy. |
Hide | Prevents the password from being shown as plain text. Deselect this option to show the password. Selected by default. |
Engine Editor – Add-Ons – Sandbox
Use this branch to select and configure sandbox servers for engines.
Option | Definition |
---|---|
Sandbox Type | Specifies which type of sandbox the engine uses for sandbox file reputation scans.
|
Option | Definition |
---|---|
>When Sandbox Type is Cloud Sandbox - Forcepoint Advanced Malware Detection | |
License Key | The license key for the connection to the cloud sandbox server. Note: The license defines the home data
center where files are analyzed. Enter the key and license token for the data center that you want to use as the home
data center.
CAUTION: The license key and license token allow access to confidential analysis
reports. Handle the license key and license token securely.
|
License Token | The license token for the connection to the cloud sandbox server. |
Sandbox Service | Specifies the sandbox service that the firewall contacts to request file reputation scans. Click Select to select a Sandbox Service element. |
HTTP Proxies (Optional) |
When specified, requests are sent through an HTTP proxy instead of the engine accessing the external network directly. Add — Allows you to add an HTTP Proxy to the list. Remove — Removes the selected HTTP Proxy from the list. |
Option | Definition |
---|---|
>When Sandbox Type is Local Sandbox - Forcepoint Advanced Malware Detection | |
License Key | The license key for the connection to the local sandbox server. |
License Token | The license token for the connection to the local sandbox server. |
Sandbox Service | Click Select to select a Sandbox Service element. |
HTTP Proxies (Optional) |
When specified, requests are sent through an HTTP proxy instead of the engine accessing the external network directly. Add — Allows you to add an HTTP Proxy to the list. Remove — Removes the selected HTTP Proxy from the list. |
Engine Editor – Add-Ons – File Reputation
Use this branch to enable file reputation services for file filtering.
Option | Definition |
---|---|
File Reputation Service | Select the file reputation service to use.
|
Option | Definition |
---|---|
>When File Reputation Service is Threat Intelligence Exchange (TIE) | |
ePO Server | Shows the selected McAfee ePO Server element. The McAfee ePO server handles the request for DXL credentials initiated by the SMC. |
Select | Opens the Select Element dialog box, where you can select an ePO Server element. |
DXL Certificates | Shows the currently valid DXL certificates. |
Generate DXL Certificates | Generates new certificates. |
Option | Definition |
---|---|
>When File Reputation Service is Global Threat Intelligence (GTI) | |
HTTP Proxies
(Optional) |
When specified, requests are sent through an HTTP proxy instead of the engine accessing the external network directly. Add — Allows you to add an HTTP Proxy to the list. Remove — Removes the selected HTTP Proxy from the list. Note: You can only use one HTTP proxy for the connection
to the McAfee Global Threat Intelligence file reputation service. If you select more than one HTTP proxy, the additional HTTP proxies are
ignored.
|
Engine Editor – Add-Ons – Anti-Spam
The Anti-Spam feature is no longer supported in NGFW version 6.2.0 and later..
Engine Editor – Add-Ons – ThreatSeeker
Use this branch to select HTTP Proxy elements for the engine's connection to the ThreatSeeker Intelligence Cloud.
Option | Definition |
---|---|
Enable | When selected, enables ThreatSeeker URL filtering for the engine. |
HTTP Proxies (Optional) |
When specified, requests are sent through an HTTP proxy instead of the engine accessing the external network directly. Add — Allows you to add an HTTP Proxy to the list. Remove — Removes the selected HTTP Proxy from the list. |
Engine Editor – Add-Ons – OPC UA Inspection
Use this branch to change inspection settings for open platform communications unified architecture (OPC UA). For information about OPC UA, see Knowledge Base article 12491.
Engine Editor – Policies
Use this branch to view information about the policy that is installed on the engine.
Engine Editor – Policies – Automatic Rules
Use this branch to view a summary of currently used Automatic rules and change general settings for Automatic rules.
Option | Definition |
---|---|
Allow Traffic to Authentication Ports
(Firewall/VPN role only) |
When Yes is selected, allows traffic to the ports that are used for user authentication. |
Allow Traffic from Listening IP Addresses to DNS Relay Port (Firewall/VPN role only) |
When Yes is selected, allows traffic from clients in the internal network to the standard DNS ports (53/TCP and 53/UDP) on the interfaces that are selected as listening interfaces for DNS relay. |
Allow Connections to Domain-Specific DNS Servers (Firewall/VPN role only) |
When Yes is selected, allows connections from the firewall to the domain-specific DNS servers specified in the DNS Relay Profile element that is selected for firewall. |
Allow Connections from Local DHCP Relay to Remote DHCP Server (Firewall/VPN role only) |
When Yes is selected, allows connections from interfaces on which DHCP relay is active to remote DHCP servers. |
Log Level for Automatic Rules | The log level for traffic that matches automatic rules.
|
Alert | When Alert is selected, specifies the Alert element that is sent. |
Reset to Default Settings | Returns Automatic Rule changes to the default settings. |
Engine Editor – Policies – Aliases
Use this branch to view and change alias translation values.
Option | Definition |
---|---|
Alias | Shows the name of the Alias element. |
Value | Right-click the
Value cell and select one of the following options:
|
Engine Editor – Advanced Settings
Use this branch to change system parameters for the NGFW Engine. These parameters control how the NGFW Engine behaves under certain traffic conditions.
Option | Definition |
---|---|
Encrypt Configuration Data | By default, the configuration of the NGFW Engine is stored in an encrypted format. Disable the encryption only if instructed to do so by Forcepoint support. |
Bypass Traffic on Overload
(IPS only) |
When selected, the NGFW Engine dynamically reduces the number of inspected connections if the load is too high. Some traffic might pass through without any access control or inspection if this option is selected. Bypassed traffic is not counted when a possible license throughput limit is enforced. The bypass does not affect traffic subject to TLS Inspection. If this option is not selected, the NGFW Engine inspects all connections. Some connections might not get through if the IPS engine gets overloaded. |
Contact Node Timeout |
The maximum amount of time the Management Server tries to connect to an NGFW Engine. A consistently slow network connection might require increasing this value. The default value is 120 seconds. Note: Setting the timeout value too short or too long can delay or prevent contact between the Management Server and the NGFW Engines.
|
Auto Reboot Timeout | Specifies the length of time after which an error situation is considered non-recoverable and the NGFW Engine automatically reboots. The default value is 10 seconds. Set to 0 to disable. |
Policy Handshake | When selected, the nodes automatically roll back to using the previously installed policy if connectivity is lost after installing a new policy. Without this feature, you must switch to the previous configuration manually through the engine's boot menu. Note: We recommend adjusting the timeout (next setting) rather than disabling
this feature completely if there is a need to make changes.
|
Rollback Timeout | The length of time the NGFW Engine waits for a management connection before it rolls back to the previously installed policy when the Policy Handshake option is active. The default value is 60 seconds. |
Automated Node Certificate Renewal | When selected, the NGFW Engine's certificate for system communications is automatically renewed before it expires. Otherwise,
the certificate must be renewed manually. Each certificate for system communications is valid for three years. If the certificate expires, other components refuse to communicate with the NGFW Engine. Note: Does not renew VPN certificates. Automatic certificate renewal for internally
signed VPN certificates is set separately in the NGFW Engine's VPN settings.
|
FIPS-Compatible Operating Mode
(Firewalls only) |
When selected, activates a mode that is compliant with the FIPS (Federal Information Processing Standard) 140-2. Note: You must also select FIPS-specific
settings in the NGFW Initial Configuration Wizard on the command line of the NGFW Engine. For more information, see How to install Forcepoint NGFW in FIPS mode.
|
Number of CPUs Reserved for Control Plane | Select how many CPUs to reserve for control plane operations. In situations
where there is exceptionally high traffic, in a denial of service attack, for example, this ensures that you can still monitor and control the NGFW Engine operation. Note: The reserved CPUs cannot be used for traffic processing. Using fewer CPUs for traffic processing
degrades performance.
|
Isolate Also Interfaces for System Communications | When selected, the reserved CPUs handle the system communications traffic that pass through the Control Interfaces and dedicated primary Heartbeat Interfaces. We recommend that you only use this option when the Physical Interfaces used for system communications do not handle any other traffic. |
Engine Editor – Advanced Settings – Traffic Handling
Use this branch to change advanced parameters that control how the engine handles traffic.
Option | Definition |
---|---|
Connection Tracking Mode
(IPS engines and Layer 2 Firewalls only) Layer 3 Connection Tracking Mode(Firewalls only) |
When connection tracking is enabled, reply packets are allowed as part of the allowed connection without an explicit Access rule. You can override this engine-specific setting and configure connection tracking for TCP, UDP, and ICMP traffic in Access rules.
|
Virtual Defragmenting
(Not Virtual NGFW Engines) (Not editable on IPS engines) |
When selected, fragmented packets are sent onwards using the same fragmentation as when they arrived at the engine.
When the engine receives fragmented packets, it defragments the packets for inspection. The original fragments are queued on the engine until the inspection is finished. If the option is not selected, the packets are sent onwards as if they had arrived unfragmented. |
Strict TCP Mode for Deep Inspection
(Not Virtual NGFW Engines) |
This option is included for backward compatibility with legacy Forcepoint NGFW software versions. Selecting this option has no effect on Forcepoint NGFW version 5.8.0 or later. |
Concurrent Connection Limit
(Not Virtual NGFW Engines) |
A global limit for the number of open connections. When the set number of connections is reached, the engine stops the next connection attempts until a previously open connection is closed. |
Default Connection Termination in Access Policy
(IPS engines and Layer 2 Firewalls only) |
Defines how connections that match Access rules with the
Discard action are handled.
|
Default Connection Termination in Inspection Policy | Defines how connections that match rules with the
Terminate action in the Inspection Policy are handled.
|
Action When TCP Connection Does Not Start With a SYN Packet
(Firewalls only) |
The engine refuses TCP connections if the TCP connection does not start with a SYN packet, even if the TCP connection matches an Access rule with the Allow action. The engine does not send a TCP reset if the TCP connection begins with a TCP reset packet.
|
Engine Editor – Advanced Settings – Certificate Validation
Use this branch to specify settings for certificate validation and revocation status checks on the engine. The settings are used for features that have certificate validation and certificate revocation checks enabled.
Option | Definition |
---|---|
HTTP Proxy (Optional) |
When specified, OCSP and CRL lookups are sent through an HTTP proxy instead of the engine accessing the external network directly. |
Timeout for OCSP and CRL Lookups | The maximum amount of time that the engine tries to connect to the CRL or OCSP server if the connection has failed. The default is 120 seconds. |
Engine Editor – Advanced Settings – SYN Rate Limits
Use this branch to change global SYN rate limits for the engine. SYN rate limits reduce the risk of SYN flood attacks against the engine.
Option | Definition |
---|---|
SYN Rate Limits | Limits for SYN packets sent to the engine.
|
Allowed SYNs per Second
(Custom only) |
The number of allowed SYN packets per second. |
Burst Size
(Custom only) |
The number of allowed SYNs before the engine starts limiting the SYN rate.
CAUTION: We recommend setting the
Burst Size value to at least one tenth of the
Allowed SYNs per Second value. If the burst size is too small, SYN rate limits do not work. For example, if the value for
Allowed SYNs per Second is 10000, the
Burst Size value must be at least 1000.
|
Engine Editor – Advanced Settings – Log Handling
Use this branch to change log handling settings for the engine. You can use log handling settings to adjust logging when the log spool on the engine fills up.
Option | Definition |
---|---|
Log Spooling Policy
(Not Virtual NGFW Engines) |
Defines what happens when the engine’s log spool becomes full.
|
Log Compression
(Antispoofing Log Event Type for Firewalls only) |
The maximum number of separately logged entries. When the defined limit is reached, a single Antispoofing log entry or Discard log entry is logged. The single entry contains information about the total number of the generated Antispoofing log entries or Discard log entries. After this, logging returns to normal and all generated entries are logged and displayed separately.
Note: Do not enable Log Compression if you want all Antispoofing and Discard entries to be logged as separate log entries (for example, for reporting or statistics).
|
Set to Default | Returns Log Compression changes to the default settings. |
Engine Editor – Advanced Settings – Scan Detection
Use this branch to change scan detection settings for the engine. You can use scan detection to count the number of connections or connection attempts within a time window and set a threshold after which an alert is generated.
Option | Definition |
---|---|
Scan Detection Mode | When you enable scan detection, the number of connections or connection attempts within a time window is counted.
|
Create a log entry when the system detects section |
Allows you to set thresholds for creating log entries. When the specified number of events for the specified time period is exceeded, log entries are created. The following options are available for each protocol:
|
Log Level | Specifies the log level for the log entries.
|
Alert | When the Log Level is set to Alert, specifies the Alert that is sent. |
Severity | When the Log Level is set to Alert, allows you to override the severity defined in the Alert element. |
Set to Default | Returns Scan Detection changes to the default settings. |
Engine Editor – Advanced Settings – DoS Protection
Use this branch to configure protection that can help prevent Denial of Service (DoS) attacks.
Option | Definition |
---|---|
Rate-Based DoS Protection Mode | Enables or disables DoS protection, which can help prevent Denial of Service (DoS) attacks.
|
SYN Flood Sensitivity | When SYN flood protection is activated, the NGFW Engine acts as a SYN proxy. The engine completes the TCP handshake with the
client, and only initiates the connection with the server after the client has completed the TCP handshake.
|
Limit for Half-Open TCP Connections (Optional) |
Set the maximum number of half-open TCP connections per destination IP address. The minimum is 125, the maximum is 100 000. When the limit is exceeded, the SYN flood protection is activated, and log data is generated. |
Slow HTTP Request Sensitivity | The NGFW Engine analyzes the data transfer rate and length of time it takes to read the header fields of the HTTP request. If
the sender of the request tries to keep the connection open for an unreasonable length of time, the NGFW Engine blacklists the
sender’s IP address for a specified length of time.
|
Slow HTTP Request Blacklist Timeout | The length of time for blacklisting IP addresses that are suspected of sending malicious traffic. Enter the time in seconds (the default is 300). |
TCP Reset Sensitivity | When enabled, the NGFW Engine detects the sequence numbers of the TCP RST segments to determine whether it is under a TCP Reset
attack. You cannot override this setting in individual Access rules
|
Engine Editor – Advanced Settings – Idle Timeouts
Use this branch to view and change the timeouts for removing idle connections from the state table, including non-TCP communications that are handled like connections.
Option | Definition |
---|---|
Set to Default | Returns idle timeout changes to the default settings.
The default values for the predefined protocols are:
|
Add | Adds the selected protocol to the table. Opens the Select timeout dialog box. |
Remove | Removes the selected row from the table. |
Engine Editor – Advanced Settings – Tunneling
Use this branch to change the packet tunneling settings for the engine.
Option | Definition |
---|---|
Limit for Rematching Tunneled Traffic | Specifies how many times the contents of tunneled packets can be rematched against the IPv6 Access rules or IPv4 Access rules when several layers of tunneling are encountered. The default is 1. When the limit is reached, the action defined in the Action if Limit is Exceeded setting is taken. |
Action if Limit is Exceeded | Specifies whether remaining encapsulated packets inside the tunneling packet are allowed without further inspection or discarded. The default is to discard the remaining packets. When this action is triggered, you are notified according to the Log Level setting. |
Log Level | Specifies whether you are notified through a normal (stored) log entry or an Alert when the limit for rematching tunneled traffic is reached. |
Alert | If you selected Alert as the Log Level, select the Alert element that is used when an event triggers an alert. The Alert elements can be used for matching in Alert Policies. |
Select | When Alert is selected, allows you to select the Alert element that is sent. Opens the Select Custom Alert dialog box. |
Set to Default | Returns Tunneling changes to the default settings. |