18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1: Introduction<br />

Additional <strong>Sidewinder</strong> <strong>G2</strong> operating characteristics<br />

Most proxies are disabled by default and must be enabled on the<br />

Services Configuration > Proxies window before that type <strong>of</strong> traffic can pass<br />

through <strong>Sidewinder</strong> <strong>G2</strong>. Once a proxy is enabled, you can configure which<br />

internal users can use each type <strong>of</strong> proxy by creating proxy rules and<br />

organizing them into rule groups that enforce your site’s security policy. For<br />

example, you can configure rules that allow all internal users to access all<br />

Internet Web sites, or you can prohibit users from accessing the Web from<br />

specific internal systems or from accessing specific Web sites. can configure<br />

advanced, application-specific properties for your proxy rules using Application<br />

Defenses.<br />

Note: See Chapter 4 for a detailed description <strong>of</strong> proxy rules and Application<br />

Defenses. See Chapter 9 for a detailed description <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong> proxies<br />

and procedures for configuring them.<br />

IP filtering<br />

You can configure the <strong>Sidewinder</strong> <strong>G2</strong> to securely forward IP packets between<br />

networks using IP Filter rules. Unlike proxies, which operate at the application<br />

layer and in most cases on TCP or UDP traffic, IP Filter operates directly on IP<br />

packets allowing non-TCP/UDP (as well as TCP/UDP) traffic to pass between<br />

the networks. For example, with IP Filter you can pass encrypted VPN<br />

sessions through the <strong>Sidewinder</strong> <strong>G2</strong>.<br />

IP Filter works by inspecting many <strong>of</strong> the fields within a packet, including the<br />

source and destination IP address, port, and protocol. Each packet that arrives<br />

at the <strong>Sidewinder</strong> <strong>G2</strong> will be inspected and compared to an active IP Filter rule<br />

group that you have configured. Matching packets will then be forwarded on to<br />

the destination network.<br />

You can configure IP Filter to inspect TCP, UDP, and many other protocols.<br />

With TCP, UDP, and ICMP, the <strong>Sidewinder</strong> <strong>G2</strong> can actively track individual<br />

sessions by performing stateful inspection. This ensures that only packets valid<br />

for a new session or a portion <strong>of</strong> an existing session are sent on to the final<br />

destination. In addition, the <strong>Sidewinder</strong> <strong>G2</strong> supports the ability to perform<br />

Network Address Translation (NAT) and redirection when using IP Filter.<br />

Using NAT, the source address <strong>of</strong> outgoing IP packets is translated from the<br />

client's IP address to the external address <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong>. Using<br />

redirection, the destination address <strong>of</strong> an incoming packet is rewritten to a<br />

redirect host. Using NAT and/or redirection allows the IP addresses <strong>of</strong><br />

machines behind the <strong>Sidewinder</strong> <strong>G2</strong> to be hidden. You can also allow a private,<br />

non-routeable network (such as 10.0.0.0) to access the Internet using NAT.<br />

Note: See Chapter 4 for information on using IP Filter rules.<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!