18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: Understanding Policy Configuration<br />

Rule elements<br />

Rule elements Rule elements are the building blocks for your rules and help you save time<br />

and effort by allowing you to group information, reducing the number <strong>of</strong> rules<br />

you need to create. Rule elements consist <strong>of</strong> the following:<br />

• Users and user groups—Users can be placed in user groups, allowing you<br />

to apply a single proxy rule to multiple users who share the same access<br />

privileges. See “Users and user groups” on page 104.<br />

• Network objects—Network objects are entities for which you configure the<br />

<strong>Sidewinder</strong> <strong>G2</strong> to allow or deny connections. They can consist <strong>of</strong> IP<br />

addresses, hosts, domains, netmaps, subnets, or netgroups. See “Network<br />

objects” on page 105.<br />

• Service groups—A service group is a collection <strong>of</strong> proxies and/or servers.<br />

When specified in a proxy rule, the rule will regulate access to all proxies<br />

and servers defined within that service group. See “Service groups” on<br />

page 108.<br />

Planning for rule elements<br />

In providing network security, the main objective <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong> is to<br />

enforce a set <strong>of</strong> rules that reflect your desired security policy. Properly defining<br />

and creating user groups, network objects, and service groups provides you<br />

with building blocks you can use to create sound rules. Remember, the groups<br />

you create and the rules you define serve as the embodiment <strong>of</strong> your site’s<br />

security policy.<br />

The following list provides guidelines to consider when planning your rule<br />

elements:<br />

• Start by considering your security policy. If you do not have a security<br />

policy, see the Perimeter Security Planning <strong>Guide</strong> (located on the<br />

<strong>Sidewinder</strong> <strong>G2</strong> Management Tools CD) for information on how to develop<br />

one.<br />

• Decide if you want to control access based on user groups, netgroups, or<br />

both.<br />

• If you want to control access based on user groups, make a list defining all<br />

users, and organize the list by the networking services they will be granted<br />

and authentication methods they must use.<br />

• Plan to include all users who require access to the same services using the<br />

same authentication methods in the same group.<br />

• Plan to create service groups for each user or netgroup that requires<br />

access to the same services to reduce the number <strong>of</strong> rules you need to<br />

create.<br />

103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!