18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6: Configuring Application Defenses<br />

Viewing Application Defense information<br />

For information on configuring a specific Application Defense, see the following:<br />

– Web/Secure Web (page 156)<br />

– Web Cache (page 170)<br />

– Mail (Sendmail) (page 172)<br />

– Mail (SMTP proxy) (page 181)<br />

– Citrix (page 185)<br />

– FTP (page 186)<br />

– IIOP (page 191)<br />

– Multimedia (page 191)<br />

– Oracle (page 194)<br />

– SOCKS (page 197)<br />

– SNMP (page 198)<br />

– Standard (page 201)<br />

Note: For information on configuring Application Defense groups, see<br />

“Configuring Application Defense groups” on page 202.<br />

To delete an Application Defense, select the Application Defense that you<br />

want to delete, and click Delete. You will be prompted to confirm your decision.<br />

However, you cannot delete an Application Defense if it is being used<br />

in a proxy rule. If the Application Defense is used in a rule, a pop-up window<br />

will appear informing you which rules are currently using this defense.<br />

Before you can delete the defense, you will need to modify each <strong>of</strong> the rules<br />

to remove the specified defense from those rules.<br />

• View the rules in which an Application Defense/Group is currently used—<br />

To view the rules or rule groups that currently use a particular Application<br />

Defense (or group), highlight the appropriate defense (or group) and click<br />

Usage. A pop-up window appears listing the rule names that are currently<br />

using the specified defense. Click Close when you are finished viewing the<br />

rule list.<br />

The bottom portion <strong>of</strong> each window (or pop-up, if you clicked Modify) displays<br />

the actual configuration information for the selected Application Defense. The<br />

information will vary depending on the Application Defense category you<br />

select. The following fields remain constant among all Application Defense<br />

windows:<br />

• Name—This field contains the name <strong>of</strong> the Application Defense that you<br />

are viewing. This field cannot be modified. If you need to rename an<br />

Application Defense, you can create a duplicate defense with the desired<br />

name, and then delete the existing Application Defense.<br />

• [Web/Secure Web only] Type—This field allows you to specify whether a<br />

defense will be used to protect a server, client, or both. For more<br />

information about the Type field, see “Creating Web or Secure Web<br />

Application Defenses” on page 156.<br />

• Description—This field allows you to provide information about the<br />

Application Defense to help you more easily identify it.<br />

155

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!