User`s guide

345
Other protocols s seconds
If a stateful inspection rule is created from a packet type other than TCP, UDP or ICMP, a
rule timeout should be created for it. The parameter in this text box specifies the length of
time such a rule persists. The timer is restarted each time a packet is processed by the rule.
Other Options
Expire entry after n consecutive packets in one direction
The value in this text box specifies the maximum number of consecutive packets that should
pass in one direction before the corresponding rule entry is expired.
Count missed UDP echo packets as dropped
When checked, this checkbox will cause the firewall to increment the dropped packet count
for each failed echo request in the situation where UDP echo is active on an interface that
becomes disconnected.
Related CLI Commands
Entity
Instance
Parameter
Values
Equivalent Web Parameter
fwall 0 opening 0 - 4294967296 TCP Opening s seconds
fwall 0 open 0 4294967296 TCP Open s seconds
fwall 0 closing 0 - 4294967296 TCP Closing s seconds
fwall 0 closed 0 4294967296 TCP Closed s seconds
fwall 0 udp 0 4294967296 UDP s seconds
fwall 0 icmp 0 4294967296 ICMP s seconds
fwall 0 other 0 4294967296 Other protocols s seconds
fwall 0 maxuni 0 - 2147483647
Expire entry after n consecutive
packets in one direction
fwall 0 cntmissedecho
OFF,ON
Default OFF
Count missed UDP echo packets
as dropped
RADIUS
Configuration – Security> Radius
The RADIUS client may be used for authentication purposes at the start of remote command
sessions, SSH sessions, FTP sessions, HTTP sessions and Wi-Fi client connections (PEAP &
EAP-TLS). Depending on how the RADIUS client is configured, the router may authenticate
with one or two RADIUS servers, or may authenticate a user locally using the existing table
configured on the router.
There are 2 RADIUS client configurations, RADIUS client 0 and RADIUS client 1, both have
specific functions and the correct instance (0 or 1 or both) should be configured depending
on the requirements.
To use RADUIUS for authenticating router administration access, configure RADIUS client 0.
To use RADUIUS for authenticating Wi-Fi clients, configure RADIUS client 1.
When the router has obtained the remote user username and password, the RADIUS client
is used to pass this information (from the Username and Password attributes) to the
specified RADIUS server for authorisation. The server should reply with an ACCEPT or
REJECT message.