18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table <strong>of</strong> Contents<br />

Modifying the static route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90<br />

Configuring Admin Console access . . . . . . . . . . . . . . . . . . . . . . . . . . .91<br />

Configuring the <strong>Sidewinder</strong> <strong>G2</strong> to use a UPS . . . . . . . . . . . . . . . . . . .93<br />

Configuring the <strong>Sidewinder</strong> <strong>G2</strong> to use a UPS . . . . . . . . . . . . . . . . . .93<br />

Enabling/disabling the UPS server . . . . . . . . . . . . . . . . . . . . . . . . . .95<br />

Enforcing FIPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95<br />

CHAPTER 4 Understanding Policy Configuration . . . . . . . . . . . . . . . . . . .97<br />

Policy configuration basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98<br />

An example <strong>of</strong> traffic being processed by the active rules . . . . . . .100<br />

Ordering proxy rules within a rule group . . . . . . . . . . . . . . . . . . . . .101<br />

Rule elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103<br />

Planning for rule elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103<br />

Users and user groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104<br />

Network objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .105<br />

Service groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108<br />

Application Defenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109<br />

Proxy rule basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112<br />

Basic criteria used to allow or deny a connection . . . . . . . . . . . . . .112<br />

Optional criteria used to allow or deny a connection . . . . . . . . . . .113<br />

Using NAT and redirection in proxy rules . . . . . . . . . . . . . . . . . . . .114<br />

Simple proxy rule examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115<br />

Example <strong>of</strong> proxy rules using netgroups . . . . . . . . . . . . . . . . . . . . .116<br />

Advanced proxy rule example using service groups . . . . . . . . . . . .118<br />

Default rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120<br />

IP Filter rule basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121<br />

How traffic is filtered if stateful packet inspection is enabled . . . . .122<br />

How traffic is filtered if stateful packet inspection is not enabled . .124<br />

Using NAT and redirection for IP Filter rules . . . . . . . . . . . . . . . . .125<br />

Sharing IP Filter sessions in an HA cluster . . . . . . . . . . . . . . . . . . .128<br />

Specifying the number <strong>of</strong> TCP or UDP IP Filter sessions . . . . . . . .129<br />

CHAPTER 5 Creating Rule Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131<br />

Creating users and user groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132<br />

Configuring users or user groups . . . . . . . . . . . . . . . . . . . . . . . . . .133<br />

Managing user group membership . . . . . . . . . . . . . . . . . . . . . . . . .138<br />

Creating network objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139<br />

Displaying network objects and netgroups . . . . . . . . . . . . . . . . . . .139<br />

Configuring domain objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142<br />

Configuring host objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .143<br />

Configuring IP address objects . . . . . . . . . . . . . . . . . . . . . . . . . . . .145<br />

Configuring netmaps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145<br />

Configuring subnet objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147<br />

Configuring netgroup objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148<br />

Managing netgroup membership . . . . . . . . . . . . . . . . . . . . . . . . . .149<br />

Creating service groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150<br />

vii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!