panther-modern 5 Posted September 25, 2014 Posted September 25, 2014 How are multiple rules evaluated for a single application? Is there a Cyber Security Pro document similar to How do firewall rules function in ESET Smart Security?
Arakasi 549 Posted October 3, 2014 Posted October 3, 2014 Not sure if there is a similar document but ask your question and be specific on application, ip, port, subnet and we may be able to answer easily here which rules take priority.
panther-modern 5 Posted October 4, 2014 Author Posted October 4, 2014 (edited) Thanks for the offer Arakasi, but I'm not interested in a particular rule. With all due respect, if there isn't any documentation then how can anyone speak with any authority on how a rule set is interpreted. If, however, someone does have this information, then it would be a much better idea to describe the process concretely. This seems like a pretty fundamental behaviour that should be documented. Edited October 5, 2014 by panther-modern
Arakasi 549 Posted October 5, 2014 Posted October 5, 2014 I have nothing to do with documentation. With all due respect i could tell you which rules recieve priorities based on how many you have and what kind, by not being lazy and testing on my systems. Good luck.
Recommended Posts