
271
Controlling traffic at the security gateway
Understanding and using rules
Understanding and using rules
The most flexible way to control access to and from your private networks is by creating rules. Basic
rules identify the source and destination of traffic, the interface or secure tunnel
through which the
traffic traverses the security gateway, and the protocols that apply.
You can further refine access by using time restraints and by designating authentication requirements
for specific users or groups. You can also apply antivirus, antispam, and content filtering protections
selectively to rules. You can enable suspicious activity monitoring by designating alert thresholds, that
generate notifications when they are exceeded.
The rules you create form the framework of your security policy. You can write general rules to cover a
wide range of common connection cases and then refine those rules to make them meet your specific
security needs.
This section describes the following:
■
■
■
■
■
Using protocols and proxies for specific rules
How rules are applied
When the security gateway receives a connection request, it scans the rules that you have defined and
selects the most appropriate rule to apply.
In the first scan, it searches for rules that match the time window and definition of the connection
request. From this list of possible matches, the security gateway selects the rule that most closely
matches the source address, destination address, protocol, and interface or VPN tunnel.
If there is only one match, and the rule does not require authentication, it is picked and the traffic is
allowed or denied. If authentication is required, the requesting user is prompted to enter the
appropriate credentials and is authenticated before any action is taken.
Configure authentication servers and schemes.
See the following:
■
“Authenticating with an external authentication
server”
■
“Authenticating with an external authentication
server”
Create and deploy intrusion detection and prevention
(IDS/IPS) policies.
“Blocking suspicious or malicious traffic with IDS”
Configure the protections provided by the antivirus
component.
“Protecting your network resources from virus
Configure options for preventing spamming.
“Increasing productivity by identifying spam email”
Create rules that allow or deny access through the
security gateway.
“Understanding and using rules”
Create filters to be applied to traffic through the
security gateway interfaces.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...