Chapter 4.2 Users
67
b. Firewall Rules:
Click the number of
Filter Rule No.
to edit individual rules and click
Apply
to save
the settings. The rule status will show on the list. Check
“Active”
box and click
Apply
to enable that
rule.
This link leads to the Firewall Rules page. Rule No.1 has the highest priority; Rule No.2 has the
second priority and so on. Each firewall rule is defined by Source, Destination and Pass/Block action.
Optionally, a Firewall Rule Schedule can be set to specify when the firewall rule is enforced. It can be
set to Always, Recurring or One Time.
Selecting the Filter Rule Number 1 as the example:
¾
Rule Number:
This is the
rule selected “1”. Rule No. 1 has the highest priority; rule No. 2 has
the second priority, and so on.
¾
Rule Name:
The rule name can be changed here.
¾
Source/Destination – Interface/Zone:
There are choices of
ALL, WAN1
,
WAN2
,
Default
,
and the named
Service Zones
to be applied for the traffic interface.
¾
Source/Destination – IP Address/Domain Name:
Enter the source and destination IP
addresses. Domain Host filtering is supported but Domain name filtering is not.
¾
Source/Destination – Subnet Mask:
Select the source and destination subnet masks.
¾
Source- MAC Address:
The MAC Address of the source IP address. This is for specific MAC
address filter.
¾
Source/Destination – IPSec Encrypted:
Check the box for only filtering on the encrypted
traffic.
¾
Service Protocol:
There are defined protocols in the
service protocols list
to be selected.
¾
Schedule:
When schedule is selected, clients assigned with this policy are applied the firewall
rule only within the time checked. There are three options,
Always
,
Recurring
and
One Time.
Recurring
is set with the hours within a week.
Summary of Contents for DSA-3600
Page 1: ...DSA 3600 User Guide Version DSA 3600 3 00 December 2007 ...
Page 6: ......
Page 22: ...Chapter 4 Web Interface Configuration 16 ...
Page 24: ...Chapter 4 Web Interface Configuration 18 ...
Page 39: ...Chapter 4 1 System 33 An example of Template Login Page ...
Page 121: ...Chapter 4 4 Network 115 ...
Page 143: ...Chapter 4 6 Tools 137 Figure 4 6 1a An example using Tag Based service zones ...