panther-modern 5 Posted September 25, 2014 Share Posted September 25, 2014 How are multiple rules evaluated for a single application? Is there a Cyber Security Pro document similar to How do firewall rules function in ESET Smart Security? Link to comment Share on other sites More sharing options...
Arakasi 549 Posted October 3, 2014 Share Posted October 3, 2014 Not sure if there is a similar document but ask your question and be specific on application, ip, port, subnet and we may be able to answer easily here which rules take priority. Link to comment Share on other sites More sharing options...
panther-modern 5 Posted October 4, 2014 Author Share Posted October 4, 2014 (edited) Thanks for the offer Arakasi, but I'm not interested in a particular rule. With all due respect, if there isn't any documentation then how can anyone speak with any authority on how a rule set is interpreted. If, however, someone does have this information, then it would be a much better idea to describe the process concretely. This seems like a pretty fundamental behaviour that should be documented. Edited October 5, 2014 by panther-modern Link to comment Share on other sites More sharing options...
Arakasi 549 Posted October 5, 2014 Share Posted October 5, 2014 I have nothing to do with documentation. With all due respect i could tell you which rules recieve priorities based on how many you have and what kind, by not being lazy and testing on my systems. Good luck. Link to comment Share on other sites More sharing options...
Recommended Posts