EasyManua.ls Logo

Dell SMA 200 - Page 294

Dell SMA 200
514 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Dell SonicWALL Secure Mobile Access 8.5
Administration Guide
294
Figure 45. Rule Chains
Custom rules and rule chains can be used to distinguish between legitimate and illegitimate traffic as defined
by a Web application that is using a certain URI or running on a certain portal. One rule in the chain is
configured to match the URI or portal host name, while another rule is created that matches an undesirable
value for another element of the HTTP(S) traffic. When the rule chain (both rules) matches some traffic, the
configured action is done to block or log the bad traffic from that URI or portal. When the request is blocked,
the user sees a custom block page such as that in Figure 46.
Figure 46. Block Page
The Web Application Firewall > Monitoring page also shows the activity in the graphs. Figure 47 shows several
detected and prevented threats during a 12 hour period. For more information about the Monitoring page, see
Using Web Application Firewall Monitoring on page 308.

Table of Contents

Related product manuals