In the context of a computer server acting as a firewall, a rule base is a set of rules that govern what is and what is not allowed through the firewall. A rule base
can work in one of two ways: it can either explicitly assume that all
traffic is allowed unless there is a rule to prevent it, or, more typically, it can assume that no traffic may flow through it unless there is an explicit rule to allow it. Rule bases usually work on a top-down principle in which the first rule in the list is acted upon first, so that traffic allowed by the first rule, will never be judged by the remainder of the rules. Rule bases typically have the format of SOURCE / DESTINATION / SERVICE / ACTION.
Contributor(s): Nick Brown
This was last updated in April 2007
Email Alerts
Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy
More News and Tutorials
-
Expert Michael Gregg answers a reader question about Snort and the interfaces it uses.
-
Security expert Michael Gregg notes the risks to enteprise security that mobile devices may cause.
-
Security expert Michael Gregg fields a question about unknown network cards gaining access to a user's network.