EasyManua.ls Logo

Rohde & Schwarz GP-E - Forcing Secure Communication

Rohde & Schwarz GP-E
233 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Application Examples
R&S
®
GP-E/GP-S
134User Manual v16.2.1 ─ 01
With this set of rules, all websites/URLs including the educational website
wiki.example.com are blocked, except of those websites which are related to edu-
cation and the wiki.intern.com website.
4.1.4 Forcing Secure Communication
This example shows a basic whitelisting scenario that allows users from Zone-eth2 to
access Google, but only via an SSL-encrypted connection. Other rules provide users in
the WAREHOUSE zone encrypted access to their email from Zone-eth2 and allow
Internet access (decrypted and encrypted), but filter external communication with the
Intrusion Detection/Prevention System (IDS/IPS) and Anti Malware features.
Figure 4-7: Sample firewall rules settings to access Google via an SSL-encrypted connection.
Position Policy Source Destina-
tion
Applications/Protocols Enabled Options
1 Allow Zone-eth2 WAN DNS
2 Reject Zone-eth2 WAN Google
3 Allow Zone-eth2 WAN Google SSL Inspection
Figure 4-8: Sample firewall rules settings to encrypted access to emails from a certain zone.
Position Policy Source Destina-
tion
Applications/Protocols Enabled Options
1 Allow WARE-
HOUSE
Zone-eth2 DNS
2 Reject WARE-
HOUSE
Zone-eth2 IMAP, POP3, SMTP
3 Allow WARE-
HOUSE
Zone-eth2 IMAP, POP3, SMTP SSL Inspection
Firewall Rule Examples

Table of Contents