
Chapter
6
Defining your security
environment
This chapter includes the following topics:
■
Identifying the objects used to pass traffic
■
Defining traffic endpoints with network entities
■
Understanding how protocols affect traffic
■
■
■
Controlling full application inspection of traffic
Identifying the objects used to pass traffic
Traffic is controlled through the security gateway by configuring rules, filters, and tunnels to allow or
deny the traffic. Rules, filters and tunnels point to other security gateway elements to specify the
source and destination of traffic, the interfaces through which the traffic passes, and the protocols
used.
In previous versions of the security gateway, you were required to define these elements before you
created the rule or filter that used them. In Symantec Gateway Security 5000 Series v3.0, you can
create the required elements as you create the rule, filter, or tunnel; however, you may prefer to create
them ahead of time as part of the process of defining your security environment.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...