Intrusion Defense Firewall 1.2 User's Guide - Trend Micro? Online ...
Intrusion Defense Firewall 1.2 User's Guide - Trend Micro? Online ...
Intrusion Defense Firewall 1.2 User's Guide - Trend Micro? Online ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
About <strong>Firewall</strong> Rules<br />
IDF <strong>Firewall</strong> Rules have both a rule action and a rule priority. Used in conjunction, these two properties<br />
allow you to create very flexible and powerful rule-sets. Unlike rule-sets used by other firewalls, which<br />
may require that the rules be defined in the order in which they should be run, IDF <strong>Firewall</strong> Rules are run<br />
in a deterministic order based on the rule action and the rule priority, which is independent of the order in<br />
which they are defined or assigned.<br />
Rule Action<br />
Each rule can have one of four actions.<br />
1. Bypass: if a packet matches a bypass rule, it is passed through both the firewall and the DPI<br />
Engine regardless of any other rule (at the same priority level).<br />
2. Force Allow: if a packet matches a force allow rule it is passed regardless of any other rules<br />
(at the same priority level).<br />
3. Deny: if a packet matches a deny rule it is dropped.<br />
4. Allow: if a packet matches an allow rule, it is passed. Any traffic not matching one of the allow<br />
rules is denied.<br />
5. Log Only: if a packet matches a log only rule it is passed and the event is logged.<br />
Adding an ALLOW rule will deny everything else:<br />
A DENY rule can be implemented over an ALLOW to block certain kinds of traffic:<br />
© Copyright 2010 <strong>Trend</strong> <strong>Micro</strong> Inc. www.trendmicro.com<br />
All rights reserved. - 122 -