Chapter 10. Untangle Network Policy
Up to this point, we have learned about different rules. There are the kernel-level rules that evaluate the traffic before being processed by the different applications. The kernel level rules include bypass rules, QoS rules, input filter rules, port forward rules, and so on.
When the traffic is passed to be processed by applications, different rules will be applied on the traffic. The first rule to be applied is the one that evaluates the traffic at the session initiation such as the Firewall rule. If the traffic passes the Firewall rule, it will be scanned by other applications such as Web Filter to determine whether to allow or block the traffic. After that, there are rules that will be applied after fully ...
Get Untangle Network Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.