Interaction Control rules are displayed in the allow rules table in the Allow rules section of the application web interface. Interaction Control rules include the following types:
The settings of Interaction Control rules are displayed in the following columns of the table:
Unique ID of the rule
Current state of the rule (Enabled or Disabled).
For Interaction Control rules, this indicates the technology of the rule (NIC or CC). The EVT type is indicated for rules that disable event registration.
For rules related to Network Integrity Control technology (NIC type) or rules that disable event registration (EVT type), this is the set of utilized protocols. For rules related to Command Control technology (CC type), this is the protocol and system commands. The protocols that are determined by the application based on the contents of network packets are italicized.
Device name/address information of one of the sides of network interaction. You can enable or disable the display of addresses and ports of address information by using the following settings: MAC address, IP address, Port number. If additional address spaces were added to the application, you can enable or disable the display of names of address spaces by using the following settings:
Device name/address information of the other side of network interaction. The display of address information can be configured the same way as the Side 1 column.
Additional information about the rule.
The date and time when the rule was created.
The date and time when the rule was last modified.
The name of the Process Control rule or Intrusion Detection rule that must be indicated in the event (for EVT rules).
The name of the monitoring point that must be indicated in the event (for EVT rules).
ID and title of the event type (for EVT rules).
Information about the origin of the rule.
When viewing the rules table, you can use the configuration, filter, search, and sorting functions.
Page top