Components of a Security Policy in SonicOSX 7.0
08/31/2020 0 3331
There are three steps at high level on SonicOSX 7.0 which can be observed below where first section is the match attribute used to classify the packet, perform the rule lookup and then rule match; second section being the action taken on the packet and third section as action profile used to take those additional actions (BWM,Security Services etc).
SonicOSX 7.0 combines layer 4 and 7 policies, providing admins a centralized location for configuring policies.
We can match the traffic based on the following parameters
- Source and destination zone
- IP version - IPv4/IPv6
- Source and destination address
- Source and destination port/services
- Users to be included
- Geo location
- Web category
- Custom match
We use the Source/Destination and App/URL/Custom Match tabs in the security policy to match.
There are three types of actions that can be taken once the match is done:
We use the Action section of the security policy to take any necessary action.
Along with the actions stated above, there are some additional actions that can be taken for certain types of traffic.
- Bandwidth management and QoS
- Apply security services like GAV, Anti -Spyware, IPS and Botnet filtering
- Perform additional CFS actions, such as a passphrase, confirm, safe search, consent, wipe cookies, etc
- Reporting, logging, and Syslog
- Adjusting miscellaneous settings such as connection timeouts, SIP/H323 settings, etc
We use a security rule Action to apply additional actions to the matched traffic and selected action type.
Once a security rule is added, it can be divided into these three sections easily and can be depicted in the same way on the UI.