Two types of Netlet rules are based on how the destination host is specified in the rule.
A static rule specifies a destination host as part of the rule. If you create a static rule, the user does not have the option to specify the required destination host. In the following example, sesta is the destination host.
You can configure multiple destination hosts and ports for static rules. See Static Rule With Multiple Host Connections for an example.
In a dynamic rule, the destination host is not specified as a part of the rule. The user can specify the required destination host in the Netlet provider. In the following example, TARGET is the placeholder for the destination host.
Based on the encryption cipher, Netlet rules can be further classified as follows:
User Configurable Cipher Rules - In this rule, you can specify a list of ciphers that users can choose from. These optional ciphers appear as a list in the Netlet provider. The user can choose the required cipher from the list. In the following example, the user can choose from multiple ciphers.
Although the Portal Server host may have various ciphers enabled, the user can choose only from the list that is configured as part of the Netlet rule.
See Supported Ciphers for a list of the ciphers supported by Netlet.
Administrator Configured Cipher Rules - In this rule, the cipher is defined as part of the Netlet rule. The user does not have the option to choose the required cipher. In the following example, the cipher is configured to be SSL_RSA_WITH_RC4_128_MD5.
See Supported Ciphers for a list of ciphers supported by Netlet.
Supported Ciphers lists the ciphers supported by Netlet.
Table 6–2 List of Supported Ciphers
Ciphers |
---|
Native VM Ciphers |
KSSL_SSL3_RSA_WITH_3DES_EDE_CBC_SHA |
KSSL_SSL3_RSA_WITH_RC4_128_MD5 |
KSSL_SSL3_RSA_WITH_RC4_128_SHA |
KSSL_SSL3_RSA_EXPORT_WITH_RC4_40_MD5 |
KSSL_SSL3_RSA_WITH_DES_CBC_SHA |
Java Plugin Ciphers |
SSL_RSA_WITH_3DES_EDE_CBC_SHA |
SSL_RSA_WITH_RC4_128_MD5 |
SSL_RSA_WITH_RC4_128_SHA |
SSL_RSA_EXPORT_WITH_RC4_40_MD5 |
SSL_RSA_WITH_DES_CBC_SHA |
SSL_RSA_WITH_NULL_MD5 |
TLS_RSA_WITH_AES_128_CBC_SHA |
TLS_RSA_WITH_AES_256_CBC_SHA |
Earlier versions of Portal Server did not support ciphers as part of the Netlet rules. For backward compatibility with existing rules without ciphers, a default cipher is used by the rules. An existing rule without ciphers such as:
is interpreted as:
This is similar to an Administrator Configured Rule with the Encryption cipher field chosen as Default.
Netlet rules cannot contain any port number higher than 64000.