O'Reilly logo

Untangle Network Security by Abd El-Monem A. El-Bawab

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding Untangle NGFW rules

Before we take another step forward in this chapter, it's suitable to review the Untangle rules first. After understanding the anatomy of Untangle rules, we will cover some network-related rules such as port forwarding and NATing rules.

Many Untangle applications use rules such as Firewall, Application Control, and Bandwidth Control. All of these rules are based on the same logic.

Rules are used to categorize the traffic and define the action to be taken based on this categorization. For example, Firewall can decide whether to block or pass traffic depending on the destination port, source address, protocol, and so on.

Rules are evaluated against every session in order, from top to bottom. If a rule match is found, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required