18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IP Filter rule basics<br />

Mutually<br />

exclusive rules for<br />

SMTP<br />

configurations<br />

IP Filter rule basics IP Filter rules allow you to securely forward IP packets between<br />

networks, allowing traffic to pass between the networks (for example,<br />

encrypted VPN sessions). You can create IP filter rules for TCP, UDP,<br />

ICMP, and many other protocols (such as AH).<br />

4-28 Understanding Policy Configuration<br />

Rule Name Summary<br />

Plus the rules below if using transparent SMTP<br />

smtp out Allow SMTP access from internal to external. This rule<br />

is created and included in the Mail rule group if you<br />

selected transparent Mail services during<br />

configuration.<br />

smtp in Allow SMTP access from external to internal. This rule<br />

is created and included in the Mail rule group if you<br />

selected transparent Mail services during<br />

configuration.<br />

Plus the rule below if using Secure Split SMTP<br />

smtp all This rule is created and included in the Mail rule<br />

group if you selected Secure Split SMTP servers<br />

during configuration.<br />

Functionally, IP Filter is based upon a rule database in the <strong>Sidewinder</strong><br />

<strong>G2</strong> kernel. IP Filter rules filter incoming packets based on source and<br />

destination IP address. Like proxy rules, IP Filter rules also have the<br />

option <strong>of</strong> using network address translation (NAT) and/or redirection.<br />

You can configure and manage the IP Filter rule database using the<br />

Admin Console.<br />

IP Filter processing can be configured to reject the following source<br />

address packets:<br />

Packets with broadcast source addresses<br />

Packets with source addresses on a loopback network that were<br />

received on a non-loopback device<br />

Note: Packets that are rejected for source route information will generate a<br />

netprobe audit event.<br />

When you initially configure the <strong>Sidewinder</strong> <strong>G2</strong>, you will have a<br />

default IP Filter rule group that is assigned in the active rules. This<br />

rule group is empty. You can create and add rules and/or rule groups<br />

to this group, or create your own group and assign it as the active rule<br />

group instead.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!