180
Defining your security environment
Understanding how protocols affect traffic
4
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
5
Click
OK
.
6
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
7
Do one of the following:
■
To use the protocol in a rule, add it to a service group, and use the service group in a rule.
■
To use the protocol in a packet filter, specify the entry direction associated with the protocol.
■
To use the protocol with IDS/IPS, add it to an IDS/IPS service.
Related information
For further information related to this topic, see the following:
■
“IP Based Protocol Properties—General tab”
■
■
“Enabling a new protocol to trigger IDS/IPS events”
■
Configuring TCP/UDP-based protocols
By default, the GSP server application handles all TCP service requests transparently, provided the
destination is a published entity. The GSP proxies these requests to their destinations as if the
requester was directly connected to the remote destination machine.
Prerequisites
None.
To configure TCP/UDP-based protocols
1
In the SGMI, in the left pane, under Assets, click
Protocols
.
2
In the right pane, on the Protocols tab, click
New > TCP UDP-Based Protocol
.
3
In the TCP UDP Based Protocol Properties dialog box, on the General tab, do the following:
Caption
Type a brief description of the custom protocol.
Protocol name
Type a unique name for the protocol.
The name cannot contain spaces.
Base protocol type
Select a base protocol.
Destination port use
Select whether a port range or a single port will be used as the protocol’s destination
port.
Destination low port
If you selected to use a port range, type the port number at the lower end of the
range of destination ports.
If you selected to use a single port, type the port to be used as the destination port.
Destination high port
If you selected to use a port range, type the port number at the upper end of the
range of the protocol’s destination ports.
If you selected to use a single port, this field is greyed out.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...