乾颐堂乾颐盾思科ASA FirePower,action介绍 5条最基本原则
Rule 1: Monitor evaluates traffic first. Monitor rules track and log network traffic but do not affect traffic flow. The system continues to match traffic against additional rules to determine whether to permit or deny it.
Rule 2: Trust evaluates traffic next. Matching traffic is allowed to pass to its destination without
further inspection. Traffic that does not match continues to the next rule.
Rule 3: Block evaluates traffic third. Matching traffic is blocked without further inspection. Traffic
that does not match continues to the final rule.
Rule 4: Allow is the final rule. For this rule, matching traffic is allowed; however, prohibited files,
malware, intrusions, and exploits within that traffic are detected and blocked. Remaining
non-prohibited, non-malicious traffic is allowed to its destination. Note that you might have
additional Allow rules that perform only file inspection, or only intrusion inspection, or neither.
Default Action
|