593
Field descriptions
Policy field descriptions
Rule Properties—Miscellaneous tab
Use the Miscellaneous tab to enable or disable the options that affect logging, content security
scanning, and high availability/load balancing.
Associated tasks
The tasks that you can perform with this tab include:
■
“Modifying firewall rules to reduce log messages”
■
“Using content security checks with rules”
■
“Using stateful failover to maintain cluster connections”
Table D-26
Rule Properties—Miscellaneous tab
Field
Description
Log successful
connections
Indicates that the security gateway is logging successful connections.
This option has the following effects:
■
When checked, the security gateway logs all messages, including successful connection
messages.
■
When unchecked, the security gateway only logs failed connections and warning and
error conditions for this rule. This reduces the number of log messages produced,
saving disk space.
■
This option has no affect on the logging of access denied messages; these are always
logged.
This option is checked by default.
Application data
scanning
Indicates whether application data scanning is enabled.
This option is only available if the service group for the rule contains the HTTP protocol.
This option has the following effects:
■
When checked on a rule that controls HTTP/HTTPS traffic, the driver forwards
protocol packets up to the proxies first to do protocol checking.
■
When unchecked, the driver bypasses the proxies (after the initial connection has been
made) and forwards the packets on to the requested destination.
Disabling application data scanning results in faster performance but lower levels of
security.
If you uncheck application data scanning, you cannot enable antivirus scanning for the
HTTP proxies, or HTTP content filtering.
If antivirus scanning or HTTP content filtering were previously enabled on the rule,
they are disabled.
This option is checked by default.
Stateful failover
Indicates whether the control of stateful failover with High Availability/Load Balancing
(HA/LB) is enabled.
This option is only available if the service group for the rule contains the HTTP, Telnet, or
FTP protocols, or a TCP-GSP or TCPAP-GSP protocol.
When checked, connections are maintained even after a security gateway failure in a cluster
environment. HA/LB maintains connections without reconnecting or re-authenticating as
long as the connection was active for sixty seconds prior to the failure.
If antivirus scanning is required for this rule, leave this option unchecked.
This option is unchecked by default.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...