18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Proxy rule basics<br />

Table 4-4. Application Defense group used in the InternetServices rule<br />

Service Group Apps Application Defense Used in Group<br />

finger Standard (finger-specific connection properties)<br />

ftp FTP (FTP allowed permits, connection properties)<br />

gopher Standard (gopher-specific connection properties)<br />

http Web (header filtering, MIME/virus filtering, etc)<br />

https SecureWeb (SSL decryption, MIME/virus filtering, etc)<br />

nntp Standard (nntp-specific connection properties)<br />

ping Standard (ping-specific connection properties)<br />

RealMedia Standard (RealMedia-specific connection properties)<br />

rtsp Standard (rtsp-specific connection properties)<br />

telnet Standard (Telnet-specific connection properties)<br />

Proxy rule basics The following subsections provide information on the basic<br />

components that comprise a proxy rule.<br />

Note: This section provides an overview <strong>of</strong> proxy rules. For instructions on creating proxy<br />

rules, see “Creating proxy rules” on page 7-4.<br />

Basic criteria used to allow or deny a connection<br />

<strong>Sidewinder</strong> <strong>G2</strong> determines whether to allow or deny a proxy or server<br />

connection by sequentially checking the rules in the active proxy rule<br />

group for the first match to ALL criteria attributed to the connection<br />

request. When a match is found, the connection will be allowed or<br />

denied based on the option selected in the Action field. The basic<br />

criteria used to allow or deny a connection includes the following:<br />

Note: The <strong>Sidewinder</strong> <strong>G2</strong> uses the first proxy rule that matches all characteristics <strong>of</strong> the<br />

connection request to determine whether the connection will be allowed or denied.<br />

Understanding Policy Configuration 4-17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!