Book Image

Untangle Network Security

By : Abd El Monem A Mohamed El Bawab
Book Image

Untangle Network Security

By: Abd El Monem A Mohamed El Bawab

Overview of this book

Table of Contents (21 chapters)
Untangle Network Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Understanding Untangle's Firewall application


Firewalls are used to separate your internal networks from the Internet and to limit access from outside the network to your internal resources. Untangle's Firewall application is a layer 7 firewall, which means it can block traffic based on the protocol, IP, port, and even the Active Directory users and groups.

Technical details

Untangle's Firewall application works in OSI layer 7 (application layer), which allows it to completely understand the traffic and hence filter that traffic based on various application layer conditions such as Client has Exceeded Quota and HTTP: Client User OS.

Untangle's Firewall application rules define the criteria of the traffic. When this criteria is matched with the rule, the action described on that rule will be taken. The different criteria (matchers) are as follows:

  • Source IP address

  • Source port

  • Source interface

  • Destination IP address

  • Destination port

  • Destination interface

  • Protocol

  • Active Directory user

  • Active Directory...