HP X Unified Security Platform Series Instrukcja Użytkownika Strona 82

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 333
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 81
Chapter 4 Firewall
66 X Family LSM User’s Guide V 2.5.1
The firewall rule table is searched from the top of the table to the end (if necessary) looking
for the first firewall rule that will match the session. Thus, it is important to put the most
specific rules (for example, those configured with user authentication, IP address groups/
ranges, or web filtering) towards the top of the table. The following diagram illustrates how
session requests are evaluated.
STEP 4
When a rule is matched, the device enforces the firewall rule based on the action and logging
configuration for the rule: Traffic is either permitted or blocked; the event is entered in the
local log, sent to a remote syslog server, or not logged at all.
STEP 5
If no matching firewall rule is found in the firewall rules list, the device denies the request
using the implicit deny rule preconfigured on the device. For details, see
Default Firewall
Rules” on page 67.
Figure 4–1: Handling Firewall Session Requests
Przeglądanie stron 81
1 2 ... 77 78 79 80 81 82 83 84 85 86 87 ... 332 333

Komentarze do niniejszej Instrukcji

Brak uwag