Dell SonicWALL Secure Mobile Access 8.5Administration Guide 294Figure 45. Rule ChainsCustom rules and rule chains can be used to distinguish between legitimate and illegitimate traffic as definedby a Web application that is using a certain URI or running on a certain portal. One rule in the chain isconfigured to match the URI or portal host name, while another rule is created that matches an undesirablevalue for another element of the HTTP(S) traffic. When the rule chain (both rules) matches some traffic, theconfigured action is done to block or log the bad traffic from that URI or portal. When the request is blocked,the user sees a custom block page such as that in Figure 46.Figure 46. Block PageThe Web Application Firewall > Monitoring page also shows the activity in the graphs. Figure 47 shows severaldetected and prevented threats during a 12 hour period. For more information about the Monitoring page, seeUsing Web Application Firewall Monitoring on page 308.