Dell SMA 200 Administration Manual page 294

Table of Contents

Advertisement

Figure 45. Rule Chains
Custom rules and rule chains can be used to distinguish between legitimate and illegitimate traffic as defined
by a Web application that is using a certain URI or running on a certain portal. One rule in the chain is
configured to match the URI or portal host name, while another rule is created that matches an undesirable
value for another element of the HTTP(S) traffic. When the rule chain (both rules) matches some traffic, the
configured action is done to block or log the bad traffic from that URI or portal. When the request is blocked,
the user sees a custom block page such as that in
Figure
46.
Figure 46. Block Page
The Web Application Firewall > Monitoring page also shows the activity in the graphs.
Figure 47
shows several
detected and prevented threats during a 12 hour period. For more information about the Monitoring page, see
Using Web Application Firewall Monitoring
on page 308.
Dell SonicWALL Secure Mobile Access 8.5
294
Administration Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sma 400Sra 1600Sra 4600Sma 500v

Table of Contents