18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Creating Citrix<br />

Application<br />

Defenses<br />

Figure 6-13. Application<br />

Defenses: Citrix window<br />

Configuring the Default filter rule action<br />

Creating Citrix Application Defenses<br />

The default filter rule is a catch-all rule designed to occupy the last<br />

position in your rule table. To modify the default action for the default<br />

MIME filtering rule, do the followings:<br />

1. Select the default rule in the table and click Modify. The MIME Default<br />

Action window appears.<br />

2. Select the appropriate action for this rule and then click OK.<br />

Allow—The default rule is initially configured to allow all messages<br />

that do not match other filter rules. If you leave the default rule as<br />

an allow rule, you must create filter rules that require virus<br />

scanning or explicitly deny any MIME types that you do not want<br />

to allow, and place them in front <strong>of</strong> the default allow rule.<br />

Deny—If you prefer the default rule to deny all data that did not<br />

match a filter rule, you must create the appropriate virus scan and<br />

allow rules, and place them in front <strong>of</strong> the default deny rule.<br />

Virus Scan—If you want to perform virus scanning for messages<br />

that do not match other allow or deny filter rules, select this<br />

option. You will then need to create the appropriate allow and<br />

deny rules that will not require scanning.<br />

To configure Citrix Application Defenses, in the Admin Console select<br />

Policy Configuration -> Application Defenses -> Defenses -> Citrix. The<br />

following window appears. (Figure 6-13 displays only the bottom<br />

portion <strong>of</strong> the windows.)<br />

Configuring Application Defenses 6-31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!