18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: Understanding Policy Configuration<br />

Policy configuration basics<br />

Policy<br />

configuration<br />

basics<br />

98<br />

Figure 44: Basic rule<br />

group structure Sample rule group<br />

Your site’s security policy is implemented and enforced by applying rules to all<br />

traffic that passes through the <strong>Sidewinder</strong> <strong>G2</strong>. Each rule is basically a mini<br />

policy that contains criteria which are used to inspect incoming or outgoing<br />

traffic. Rules determine whether that traffic will be allowed to continue to its<br />

destination. There are two distinct rules types that you can configure on the<br />

<strong>Sidewinder</strong> <strong>G2</strong>:<br />

• Proxy rules—Proxy rules allow you to control access to <strong>Sidewinder</strong> <strong>G2</strong><br />

proxies and servers. Proxy rules determine whether traffic will be allowed<br />

through the <strong>Sidewinder</strong> <strong>G2</strong> or denied using various criteria such as source<br />

and destination address.<br />

Proxy rules are automatically bi-directional, meaning that a rule allows traffic<br />

or sessions to be initiated from both source and destination addresses.<br />

Also, each rule automatically allows the response(s) to the initial request.<br />

Note: When you are configuring proxy rules for a particular proxy or service,<br />

you must ensure that the corresponding proxies and/or servers have also been<br />

enabled and configured before the rule will pass traffic. This can be verified at<br />

Policy Configuration > Proxies and Policy Configuration > Servers.<br />

• IP Filter rules—IP Filter rules allow you to configure your <strong>Sidewinder</strong> <strong>G2</strong> to<br />

securely forward IP packets between networks. IP Filter rules operate<br />

directly on the IP packets, allowing you to configure filtering for TCP/UDP<br />

and non-TCP/UDP traffic passing between networks.<br />

After you plan and create all <strong>of</strong> the rules you need to enforce your security<br />

policy, you can organize them into sets, called rule groups. A rule group can<br />

consist <strong>of</strong> both rules and nested rule groups. A nested rule group is a rule<br />

group that you place within another rule group. You can nest multiple rule<br />

groups within a rule group.<br />

Figure 44 demonstrates the basic structure <strong>of</strong> a rule group that uses nested<br />

rules.<br />

Rule 1<br />

Rule group<br />

Rule group<br />

Rule 9<br />

Rule Rule 21<br />

Rule 3<br />

Rule 4<br />

Rule 5<br />

Rule 6<br />

Rule 7<br />

Rule 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!