18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Simple proxy rule examples<br />

Chapter 4: Understanding Policy Configuration<br />

Proxy rule basics<br />

This section provides several examples <strong>of</strong> proxy rules to help you better<br />

understand how the <strong>Sidewinder</strong> <strong>G2</strong> uses a rule to determine whether to allow<br />

or deny a connection request.<br />

Table 13 summarizes criteria for a proxy rule that permits any client in a trusted<br />

burb to connect to any Web server located in the Internet burb. This criteria<br />

reflects only the basic settings needed to allow access.<br />

Table 13: Sample settings for a simple proxy rule<br />

Basic rule<br />

Criteria<br />

Service Type<br />

Service<br />

Action<br />

Setting<br />

Comments<br />

Proxy S<strong>of</strong>tware service type: proxy, server, or<br />

service group.<br />

HTTP Type <strong>of</strong> service: Telnet, FTP, Web (HTTP),<br />

etc.<br />

Allow Specifies whether to allow or deny a<br />

service.<br />

Source Burb Internal Name <strong>of</strong> the source burb.<br />

Source<br />

Destination<br />

Burb<br />

Destination<br />

any (leave<br />

blank)<br />

Name <strong>of</strong> the source network object.<br />

Internet Name <strong>of</strong> the destination burb.<br />

any (leave<br />

blank)<br />

Name <strong>of</strong> the destination network object.<br />

App. Defense Web Contains application-specific properties.<br />

There are a number <strong>of</strong> optional effects you can configure for each proxy rule.<br />

For example, by adding the entry options shown in Table 14, you can specify<br />

which internal users are allowed Web access, specify a time interval when<br />

Web access is allowed, and require authentication.<br />

115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!