192
Defining your security environment
Controlling full application inspection of traffic
)
CONNECT_DATA = (SID = ORCL))
(SOURCE_ROUTE = YES)
)
In this example:
■
ORCL is the DB ID.
■
firewall_interface_IP is the security gateway’s closest interface to the client.
■
Oracle_Database_IP is the IP address of the Oracle database server on the outside network.
Related information
None.
Controlling full application inspection of traffic
To configure the security gateway to pass specific kinds of traffic, you configure global settings for the
proxies associated with the protocols that pass the traffic. To use the protocols in rules, you add them
to service groups. This lets you configure protocol settings that are specific to each service group.
This section covers the following methods for controlling traffic:
■
Defining file control and access
■
■
Controlling Internet-based data communications
■
■
■
Synchronizing security gateway time
■
■
Handling streaming audio and video
■
■
■
Defining file control and access
You can configure the security gateway to control authorized users’s access to files and shares on the
protected network by using two of the security gateway’s proxies: the CIFS proxy and the NBDGRAM
proxy. Each of these proxies is configurable and can limit the extent to which users can add, open,
modify, and delete files and folders.
This section covers the CIFS and NBDGRAM proxies in greater detail, and provides the steps necessary
to configure the security gateway appropriately.
Understanding file control and access
The Common Internet File System (CIFS) protocol and its predecessor, System Message Block (SMB)
protocol, are the network foundation for many Microsoft applications. These applications include file
and print sharing, named pipes, network browsing, remote management, NT Domain, DCE RPC, and
DCOM. The CIFS/SMB proxy integrates Microsoft networking support into the security gateway
environment in a way that makes setup as easy and flexible as possible.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...