Enable TCP sequence number randomization.Update route version when a route is enabled/disabled (affects existing connections).Flush flows on an alternate path when normal route path is enabled (affects existing connections).Ignore ARPs with primary gateways MAC received on other interfaces.Periodically broadcast system ARPs every 60 minutes.Never broadcast more than 100 Gratuitous ARPs in any 60 second period.
Enable Gratuitous ARP Compatibility Mode.Bypass ARP processing on L2 bridge interfaces.Only allow ARP entries with unicast addresses.Enable Source IP Address validation for being directly connected.Enable open ARP behavior (WARNING: Insecure!!).Keep in mind these options are undocumented, unsupported, and it is suggested to only make changes to these values if instructed by Dell Technical Support. Below is a rough list of some of the options. For me, the option I needed was “Disable Port Scan Detection” under the Firewall section. Under Internal Settings, there are quite a few settings and options. On the main page, you will see the following disclaimer. It appears to be available in all of the TZ series devices, the SOHO, and likely others. Earlier I stumbled across a hidden set of features and settings in a TZ215 by going to /diag.html and figured I'd share this with everyone in case you were unaware of it as I was.