18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 4-7. IP Filtering on<br />

non-TCP/UDP packets<br />

incoming<br />

packet A<br />

incoming<br />

packet B<br />

IP Filter rule basics<br />

The following two sections summarize how IP Filtering works for<br />

non-TCP/UDP traffic and for TCP/UDP traffic.<br />

Note: For information on creating IP Filter rules, see “Creating IP Filter rules” on page 7-<br />

12.<br />

Using IP Filter to filter non-TCP/UDP traffic<br />

When a non-TCP/UDP packet is received on one <strong>of</strong> the <strong>Sidewinder</strong><br />

<strong>G2</strong> network interfaces, the <strong>Sidewinder</strong> <strong>G2</strong> checks the active IP Filter<br />

rules to determine whether the packet matches any <strong>of</strong> the allow rules<br />

specified. If a rule match is found, the packet source or destination<br />

address and ports will be translated according to the translation<br />

information that is configured for that rule. The packet then is<br />

forwarded on for any further <strong>Sidewinder</strong> <strong>G2</strong> processing. The<br />

flowchart in Figure 4-7 illustrates this process.<br />

Note: If there are no rules in the IP Filter database, the IP Filter is bypassed and the<br />

<strong>Sidewinder</strong> <strong>G2</strong> performs normal processing on the packet.<br />

active IP<br />

Filter rules<br />

no match<br />

match<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

Deny Rule<br />

reject packet<br />

no further<br />

processing<br />

allow or<br />

deny rule?<br />

Allow Rule<br />

translate packet<br />

(as rule<br />

required)<br />

continue application<br />

layer proxy<br />

processing<br />

Understanding Policy Configuration 4-29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!