Book Image

Untangle Network Security

By : Abd El Monem A Mohamed El Bawab
Book Image

Untangle Network Security

By: Abd El Monem A Mohamed El Bawab

Overview of this book

Table of Contents (21 chapters)
Untangle Network Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Chapter 10. Untangle Network Policy

Up to this point, we have learned about different rules. There are the kernel-level rules that evaluate the traffic before being processed by the different applications. The kernel level rules include bypass rules, QoS rules, input filter rules, port forward rules, and so on.

When the traffic is passed to be processed by applications, different rules will be applied on the traffic. The first rule to be applied is the one that evaluates the traffic at the session initiation such as the Firewall rule. If the traffic passes the Firewall rule, it will be scanned by other applications such as Web Filter to determine whether to allow or block the traffic. After that, there are rules that will be applied after fully classifying the traffic, such as the Application Control and Bandwidth Control rules. In addition, each individual application has rules to not scan traffic from a certain website or from certain device.

All the previous rules are based on the traffic...