HP SuperStack Firewall Series Manual de usuario Pagina 103

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 214
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 102
Editing Policy Rules 103
marked Name Service (DNS) [53,6] deletes just the TCP portion of the
service.
Editing Policy Rules
Network Access Policy Rules evaluate network trafficssourceIPaddress,
destination IP address, and IP protocol type to decide if the IP traffic is
allowed to pass through the Firewall. Custom rules take precedence, and
may override the Firewalls default state packet inspection. Up to 100
policy rules may be entered.
CAUTION: The ability to define Network Access Rules is a very powerful
tool. Using custom rules, it is possible to disable all firewall protection or
block all access to the Internet. Use extreme caution when creating or
deleting Network Access Rules.
Network Access Rules do not disable protection from Denial of Service
attacks, such as SYN Flood, Ping of Death or LAND. However, it is possible
to create vulnerabilities to attacks that exploit vulnerabilities in
applications, such as WinNuke.
Viewing Network
Policy Rules
Click Policy,andthenselectthePolicy Rules tab. A window similar to that
in Figure 46 displays.
Figure 46
Policy Rules Window
The Current Network Policy Rules table is an extension of the Services
display covered in Changing Policy Serviceson page 97. In this display
you will see the default rules and any rules you have created. You can use
this screen to fine-tune services and add exceptions.
DUA1611-0AAA02.book Page 103 Thursday, August 2, 2001 4:01 PM
Vista de pagina 102
1 2 ... 98 99 100 101 102 103 104 105 106 107 108 ... 213 214

Comentarios a estos manuales

Sin comentarios