05.08.2013 Views

Intrusion Defense Firewall 1.2 User's Guide - Trend Micro? Online ...

Intrusion Defense Firewall 1.2 User's Guide - Trend Micro? Online ...

Intrusion Defense Firewall 1.2 User's Guide - Trend Micro? Online ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

About <strong>Firewall</strong> Rules<br />

IDF <strong>Firewall</strong> Rules have both a rule action and a rule priority. Used in conjunction, these two properties<br />

allow you to create very flexible and powerful rule-sets. Unlike rule-sets used by other firewalls, which<br />

may require that the rules be defined in the order in which they should be run, IDF <strong>Firewall</strong> Rules are run<br />

in a deterministic order based on the rule action and the rule priority, which is independent of the order in<br />

which they are defined or assigned.<br />

Rule Action<br />

Each rule can have one of four actions.<br />

1. Bypass: if a packet matches a bypass rule, it is passed through both the firewall and the DPI<br />

Engine regardless of any other rule (at the same priority level).<br />

2. Force Allow: if a packet matches a force allow rule it is passed regardless of any other rules<br />

(at the same priority level).<br />

3. Deny: if a packet matches a deny rule it is dropped.<br />

4. Allow: if a packet matches an allow rule, it is passed. Any traffic not matching one of the allow<br />

rules is denied.<br />

5. Log Only: if a packet matches a log only rule it is passed and the event is logged.<br />

Adding an ALLOW rule will deny everything else:<br />

A DENY rule can be implemented over an ALLOW to block certain kinds of traffic:<br />

© Copyright 2010 <strong>Trend</strong> <strong>Micro</strong> Inc. www.trendmicro.com<br />

All rights reserved. - 122 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!