Next: Dynamic Activity Monitoring Up: Major Features Previous: Network Isolation

Authorization Rule Base

There is a powerful, centrally controlled rule-based system (set up and tuned by the system administrator) which controls access to your network. The rules determine which hosts are authorized to get into or out of the protected network, when access is permitted, which types of access are permitted, and what frequency of successful or unsuccessful connections to the protected network is cause for alarm. Unless a specific rule permits access into or out of your protected network, access is denied.

The authorizations can only be added or modified by the Security Administrator physically sitting at the system console. The rule base cannot be modified remotely, and can only be viewed from the G Box console.


tkevans@delmarva.com