Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Understanding the Backdoor Rulebase Operation Setting

    The Backdoor rulebase operation setting is a toggle between Ignore and Detect.

    Use Ignore to whitelist services for accepted forms of interactive traffic, such as Telnet, SSH, RSH, NetMeeting, or VNC.

    Use Detect for all other interactive traffic.

    List the ignore rule first, followed by the detect rule.

    Tip: You can use two rules to protect a large number of servers. Configure rule 1 to match services you do not want to detect and set Operation to Ignore. Configure rule 2 to match any traffic and set Operation to Detect.

    Published: 2011-02-08