Using Reject
In certain situations the Reject action is recommended instead of the Drop action because a "polite"
reply is required from NetDefendOS. An example of such a situation is when responding to the
IDENT user identification protocol. Some applications will pause for a timeout if Drop is used and
Reject can avoid such processing delays.
3.5.4. Editing IP rule set Entries
After adding various rules to the rule set editing any rule can be achieved in the Web Interface by
right clicking on that line.
A context menu will appear with the following options:
Edit
This allows the contents of the rule to be changed.
Delete
This will remove the rule permanently from the rule set.
Disable/Enable
This allows the rule to be disabled but left in the rule set. While disabled the
rule set line will not affect traffic flow and will appear grayed out in the user
interface. It can be re-enabled at any time.
Move options
The last section of the context menu allows the rule to be moved to a
different position in the rule set and therefore have a different precedence
3.5.5. IP Rule Set Folders
In order to help organise large numbers of entries in IP rule sets, it is possible to create IP rule set
folders. These folders are just like a folder in a computer's file system. They are created with a given
name and can then be used to contain all the IP rules that are related together as a group.
Using folders is simply a way for the administrator to conveniently divide up IP rule set entries and
no special properties are given to entries in different folders. NetDefendOS continues to see all
entries as though they were in a single set of IP rules.
The folder concept is also used by NetDefendOS in the address book, where related IP address
objects can be grouped together in administrator created folders.
Example 3.16. Adding an Allow IP Rule
This example shows how to create a simple Allow rule that will allow HTTP connections to be opened from the
lannet network on the lan interface to any network (all-nets) on the wan interface.
Command-Line Interface
First, change the current category to be the main IP rule set:
gw-world:/> cc IPRuleSet main
Now, create the IP rule:
gw-world:/main> add IPRule Action=Allow Service=http
SourceInterface=lan SourceNetwork=lannet
DestinationInterface=wan
DestinationNetwork=all-nets
Name=lan_http
Return to the top level:
gw-world:/main> cc
3.5.4. Editing IP rule set Entries
Chapter 3. Fundamentals
126
Summary of Contents for NetDefend DFL-260E
Page 27: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 27...
Page 79: ...2 7 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 79...
Page 146: ...3 9 DNS Chapter 3 Fundamentals 146...
Page 227: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 227...
Page 241: ...5 4 IP Pools Chapter 5 DHCP Services 241...
Page 339: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 339...
Page 360: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 360...
Page 382: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 382...
Page 386: ...The TLS ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 386...
Page 439: ...Figure 9 3 PPTP Client Usage 9 5 4 PPTP L2TP Clients Chapter 9 VPN 439...
Page 450: ...9 7 6 Specific Symptoms Chapter 9 VPN 450...
Page 488: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 488...
Page 503: ...11 6 HA Advanced Settings Chapter 11 High Availability 503...
Page 510: ...12 3 5 Limitations Chapter 12 ZoneDefense 510...
Page 533: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 533...