Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
294
Figure 45. Rule Chains
Custom rules and rule chains can be used to distinguish between legitimate and illegitimate traffic as defined
by a Web application that is using a certain URI or running on a certain portal. One rule in the chain is
configured to match the URI or portal host name, while another rule is created that matches an undesirable
value for another element of the HTTP(S) traffic. When the rule chain (both rules) matches some traffic, the
configured action is done to block or log the bad traffic from that URI or portal. When the request is blocked,
the user sees a custom block page such as that in
.
Figure 46. Block Page
The
Web Application Firewall > Monitoring
page also shows the activity in the graphs.
shows several
detected and prevented threats during a 12 hour period. For more information about the Monitoring page, see
Using Web Application Firewall Monitoring
.