Book Image

Untangle Network Security

By : Abd El Monem A Mohamed El Bawab
Book Image

Untangle Network Security

By: Abd El Monem A Mohamed El Bawab

Overview of this book

Table of Contents (21 chapters)
Untangle Network Security
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Understanding Untangle NGFW rules


Before we take another step forward in this chapter, it's suitable to review the Untangle rules first. After understanding the anatomy of Untangle rules, we will cover some network-related rules such as port forwarding and NATing rules.

Many Untangle applications use rules such as Firewall, Application Control, and Bandwidth Control. All of these rules are based on the same logic.

Rules are used to categorize the traffic and define the action to be taken based on this categorization. For example, Firewall can decide whether to block or pass traffic depending on the destination port, source address, protocol, and so on.

Rules are evaluated against every session in order, from top to bottom. If a rule match is found, the action defined in that rule will be taken directly, and no additional rules are evaluated. If the traffic doesn't match any rule, the action will be defined by the application, which is usually doing nothing.

The properties of Untangle NGFW rules...