18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Application Defenses<br />

4-16 Understanding Policy Configuration<br />

IIOP—This category allows you to configure filtering properties for<br />

the Internet Inter-ORB Protocol (IIOP) proxy. For information on<br />

configuring an IIOP Application Defense, see “Creating IIOP<br />

Application Defenses” on page 6-34.<br />

Multimedia—This category allows you to configure permissions for<br />

T.120 and H.323 proxies. For information on configuring a<br />

multimedia Application Defense, see “Configuring the IIOP<br />

Connection tab” on page 6-35.<br />

Oracle—This category allows you to configure continuous session<br />

monitoring to prevent spo<strong>of</strong>ing and tunneling attacks while<br />

sessions are in progress for the SQL proxy. For information on<br />

configuring an Oracle Application Defense, see “Creating Oracle<br />

Application Defenses” on page 6-38.<br />

SOCKS—This category allows you to configure advanced properties<br />

for the SOCKS proxy. For information on configuring a SOCKS<br />

Application Defense, see “Creating SOCKS Application Defenses”<br />

on page 6-41.<br />

SNMP—This category allows you to configure advanced properties<br />

for the SNMP proxy. For information on configuring an SNMP<br />

Application Defense, see “Creating SNMP Application Defenses”<br />

on page 6-42.<br />

Standard—This category allows you to configure connection<br />

properties for application proxies that do not require additional<br />

configuration options. You can also configure transparency<br />

properties for the Telnet proxy. For information on configuring a<br />

standard Application Defense, see “Creating Standard Application<br />

Defenses” on page 6-45.<br />

Using Application Defense groups and service groups to<br />

minimize rule creation<br />

The pre-configured rule called InternetServices uses a service group<br />

by the same name (InternetServices). This service group consists <strong>of</strong><br />

multiple applications such as HTTP, HTTPS, FTP, ping, and Telnet that<br />

require Internet access. Using an Application Defense group in this<br />

rule allows you to configure advanced, application-specific properties<br />

for each service contained in that service group without creating a<br />

separate rule for each application. The following table lists the<br />

applications that are contained in the InternetServices service group<br />

and how each application utilizes the Application Defense group.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!