168
Defining your security environment
Understanding how protocols affect traffic
11
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
12
Use the VPN security entity for any of the following:
■
To specify the source or destination of traffic in rules and packet filters.
■
To specify the local or remote endpoint in an IPsec static or gateway-to-gateway VPN tunnel.
■
To specify the local endpoint in a Client VPN tunnel.
Related information
For further information related to this topic, see the following:
■
“VPN Security Entity Properties—General tab”
■
“VPN Security Entity Properties—Tunnel Endpoints tab”
■
■
■
Understanding how protocols affect traffic
A network protocol is a set of communication rules agreed upon by endpoints (computers) for the
purpose of exchanging data.
The security gateway predefines the most commonly used protocols, including their ports and packet
types (TCP, UDP, IP, or ICMP). You can use these predefined protocols singly or in combination in rules
by including them in the service group that is specified for the rule. You cannot change or delete the
predefined protocols.
Protocols are also associated with the entry directions you specify in packet filters, and with the port
maps that specify the routing of traffic in relation to IDS/IPS services.
You can also define additional custom protocols which may be necessary for custom applications.
To use a protocol, it must be associated with either an individual predefined proxy or a Generic Service
Proxy (GSP).
This section describes the following tasks related to protocols and their affect on traffic:
■
Using protocols that are paired with proxies
■
Using protocols that are not paired with proxies
■
■
Configuring custom protocols to handle data from special applications
Note:
You can use any protocol, whether it is predefined or custom in filters, service redirects, and IDS/
IPS services.
Using protocols that are paired with proxies
The protocols that are most commonly used in IP networks have associated application-specific
proxies. When you use one of these protocols, you can modify its behavior by configuring its associated
proxy.
On the Protocols tab, protocols with proxies have Use GSP disabled by default.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...