- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
09-20-2011 11:12 AM
From what I understand, "mode shift" is the term for when an application's identification changes during inspection. For example, a flow may be initially identified as "web-browsing", and then further identified as "facebook". I can't find any documentation about how the "mode-shifted" flow is analyzed again in the security policy. Does the firewall have to parse the entire security policy all over again, or does it first search the initial rule that permitted it for any additional applications, does the box continue inspecting from the initial match rule and down to the the bottom, etc, etc.? Anyone have any ideas? Understanding this behavior could allow for more efficient policy writing.
09-20-2011 12:36 PM
The most common example is web browsing that transitions into "Facebook" and then this further transitions into "Facebook chat". If a user is blocked from web-browsing then they will never transition to a more specific aplication. Each time an application transitions to something more specific it is passed through the list of security rules again to see if it should be handled by a different security policy.
I hope this helps.
Steve Krall
09-20-2011 12:54 PM
This is helpful, thank you.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!