18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8: Creating Rules and Rule Groups<br />

Creating IP Filter rules<br />

Entering information<br />

on the Rule tab<br />

230<br />

To configure the Rules tab for an IP Filter rule, follow the steps below.<br />

1 In the Name field, specify a name for the rule. Valid values include<br />

alphanumeric characters, periods (.), underscores (_), hyphens (-), and<br />

spaces( ). The name cannot exceed 100 characters.<br />

2 In the Protocol field, select the protocol type for the rule you are creating. (If<br />

you selected TCP, UDP, or ICMP as the rule type, the Protocol field will be<br />

automatically filled in for you.)<br />

To create an IP Filter rule for a protocol that is not listed in the drop-down<br />

list, manually type the protocol number in the Protocol field.<br />

3 In the Action field, specify the action that should occur when a packet<br />

matches this rule:<br />

• Allow—The packet will be translated or redirected, as defined in the<br />

Source/Dest tab and will then continue regular kernel-level processing.<br />

• Deny—The packet will be rejected without further filtering.<br />

• Bypass IP Filter Rules —The packet will bypass IP Filter processing<br />

and go to the beginning <strong>of</strong> the proxy rule list. This option is generally<br />

used for common proxy protocols, such as HTTP, and is recommended<br />

as an optimization when you have a large number <strong>of</strong> IP Filter rules. This<br />

action is not an option for Other rules.<br />

4 In the Control field, select Enable to enable the rule or Disable to disable<br />

the rule. This allows you to temporarily disable a rule, if necessary, without<br />

deleting it. Rules that are disabled will appear grayed out in the main Rule<br />

window.<br />

5 In the Audit Level field, select the type <strong>of</strong> audit you want performed when a<br />

packet matches this rule. The options vary depending on the rule action, as<br />

follows:<br />

• If Action = Allow, then:<br />

– None—No audit information will be recorded for this rule.<br />

– Informational—Select this option to generate errors, normal traffic,<br />

and informational audit events for this rule.<br />

– Traffic—Select this option to generate normal traffic and error audit<br />

events for this rule.<br />

– Errors Only—Select this option to generate only error audit events<br />

for this rule. If you select this option, normal traffic will not be logged.<br />

(This option increases performance and reduces the size <strong>of</strong> audit<br />

logs.)<br />

• If Action = Deny or Bypass IP Filter Rules, then:<br />

– All—Select this option to generate audit events for all packets that<br />

match this rule.<br />

– Limit—Select this option to generate audit events for this rule at the<br />

frequency specified in the IP Filter Properties window’s setting. See<br />

“Viewing and modifying general IP Filter properties” on page 241 for<br />

more information.<br />

– None—No audit information will be recorded for this rule.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!