12.07.2015 Views

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

Symantec™ Security Gateways Reference Guide - Sawmill

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

66 Understanding accessRulesWhen a connection request matches a rule, the security gateway determines whether or not authenticationon that rule is required. If the rule requires authentication and the connecting user identifies themselfproperly, the connection is permitted. If the user fails to identify themself, the connection is denied, and amessage is logged.Configuration and modification information for rules is found in your product’s administrator guide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!