18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

C HAPTER 4<br />

Understanding Policy<br />

Configuration<br />

About this chapter This chapter provides an overview <strong>of</strong> the pieces that comprise your<br />

security policy: rules, rule elements, and Application Defenses. It also<br />

provides useful examples to assist you in building rules and<br />

organizing them into the groups that you use to enforce your security<br />

policy.<br />

Policy<br />

configuration<br />

basics<br />

This chapter covers the following topics:<br />

“Policy configuration basics” on page 4-1<br />

“Rule elements” on page 4-6<br />

“Application Defenses” on page 4-14<br />

“Proxy rule basics” on page 4-17<br />

“IP Filter rule basics” on page 4-28<br />

Your site’s security policy is implemented and enforced by applying<br />

rules to all traffic that passes through the <strong>Sidewinder</strong> <strong>G2</strong>. Each rule is<br />

basically a mini policy that contains criteria which are used to inspect<br />

incoming or outgoing traffic. Rules determine whether that traffic will<br />

be allowed to continue to its destination. There are two distinct rules<br />

types that you can configure on the <strong>Sidewinder</strong> <strong>G2</strong>:<br />

Proxy rules—Proxy rules allow you to control access to <strong>Sidewinder</strong><br />

<strong>G2</strong> proxies and servers. Proxy rules determine whether traffic will<br />

be allowed through the <strong>Sidewinder</strong> <strong>G2</strong> or denied using various<br />

criteria such as source and destination address.<br />

Note: When you are configuring proxy rules for a particular proxy or service, you<br />

must ensure that the corresponding proxies and/or servers have also been enabled<br />

and configured before the rule will pass traffic.<br />

IP Filter rules—IP Filter rules allow you to configure your<br />

<strong>Sidewinder</strong> <strong>G2</strong> to securely forward IP packets between networks.<br />

IP Filter rules operate directly on the IP packets, allowing you to<br />

configure filtering for TCP/UDP and non-TCP/UDP traffic passing<br />

between networks.<br />

4<br />

Understanding Policy Configuration 4-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!