Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Understanding Backdoor Rulebase Actions

    By default, Backdoor rulebase rules accept and log traffic that matches the rule. If you choose, you can set a different action. Table 1 describes the actions you can set for Backdoor rulebase rules.

    Table 1: Backdoor Rulebase Actions




    Accepts the interactive traffic.

    Drop Connection

    Drops the interactive connection without sending an RST packet to the sender, preventing the traffic from reaching its destination. Use this action to drop connections for traffic that is not prone to spoofing.

    Close Client and Server

    Closes the connection and sends an RST packet to both the client and the server.

    Logs generated for traffic that match this rule display Close.

    Note: In sniffer mode, the IDP Series device is not in the path of network traffic. However, if you use ACM to configure a sniffer mode reset interface, the IDP Series device can send an RST packet to both the client and server but does not close the connection.

    Close Client

    Closes the interactive connection to the client but not to the server.

    Close Server

    Closes the interactive connection to the server but not to the client.

    Published: 2011-02-08