18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Application Defenses<br />

You can also create Application Defense groups that allow you to<br />

specify an Application Defense for each category (Web, Secure Web,<br />

Mail, Standard, etc.). Application Defense groups are most useful<br />

when creating rules that use service groups. When you create an<br />

Application Defense group, you can configure and specify an<br />

Application Defense for each application included in a service group.<br />

For an example <strong>of</strong> how an Application Defense group is used in a<br />

rule, see “Using Application Defense groups and service groups to<br />

minimize rule creation” on page 4-16.<br />

The following list summarizes the various categories <strong>of</strong> Application<br />

Defenses:<br />

Note: For information on specifying an Application Defense in a proxy rule, see “Creating<br />

proxy rules” on page 7-4.<br />

Web—This category allows you to configure advanced parameters<br />

for HTTP, including header filtering and MIME/virus filtering. For<br />

information on configuring a Web Application Defense, see<br />

“Creating Web or Secure Web Application Defenses” on page 6-4.<br />

Secure Web—This category allows you to configure advanced<br />

parameters for Web-based proxies, such as HTTPS and SSO. For<br />

information on configuring a Secure Web Application Defense, see<br />

“Creating Web or Secure Web Application Defenses” on page 6-4.<br />

Web Cache—This category allows you to configure Squid<br />

parameters for SmartFilter. For information on configuring a Web<br />

Cache Application Defense, see “Creating Web Cache Application<br />

Defenses” on page 6-19.<br />

Mail—This category allows you to configure mail filtering and antivirus<br />

services to ensure that all e-mail traffic is scanned and filtered<br />

before being allowed through to your internal networks. For<br />

information on configuring a mail Application Defense, see<br />

“Creating Mail Application Defenses” on page 6-21.<br />

Citrix—This category allows you to configure advanced ICA proxy<br />

parameters. For information on configuring a Citrix Application<br />

Defense, see “Creating Citrix Application Defenses” on page 6-31.<br />

FTP—This category allows you to configure FTP permissions. For<br />

information on configuring an FTP Application Defense, see<br />

“Creating FTP Application Defenses” on page 6-33.<br />

Understanding Policy Configuration 4-15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!