The Policies View
EPICenter Reference Guide
485
Figure 249: Policy definition page for an Access-based Security policy
The policy name and optional description are displayed at the top of the page.
The
Policy Traffic
section, shows the elements that define the traffic flow:
●
The
Policy Type
radio buttons determine the type of rules that will be generated from the policy
description, and thus affect how the policy endpoints are specified.
●
The rest of this area shows the network resources that define the traffic flow for the policy.
■
In the Access-based Security policy example shown in
Figure 249
, the policy traffic specification
includes two lists of resources that define the “network resources” or left-side endpoints for the
policy, and the “users” or right-side endpoints. These resources are defined in the EPICenter
Inventory or Grouping applets, and may include hosts, custom applications, users, devices, and
ports, or groups of any of those resources.
For example, the resource shown in the
Network Resources
list in
Figure 249
is a single host. The
resource in the
Users
list is a User group. If you have Administrator or Manager access, you can
use the
Edit...
button to access the resources list and view the definition of the resource groups.
You can also view their definitions through the Grouping applet. For the Network Resources side,
the resources are mapped to specific IP addresses and ports, but for the Users side, the IP
addresses are determined dynamically at network login.
If you are entering a new IP policy, the left-side endpoints will be “servers” and the right-side
endpoints will be “clients.” For the purpose of generating access list rules, those resources are
mapped to specific IP addresses and ports for use as source and destination endpoints. These lists
may also show IP addresses that have been entered directly.
Summary of Contents for EPICenter 6.0
Page 14: ...EPICenter Reference Guide 14 ...
Page 18: ...Preface EPICenter Reference Guide 18 ...
Page 19: ...1 EPICenter Basic Features ...
Page 20: ......
Page 24: ...EPICenter Overview EPICenter Reference Guide 24 ...
Page 44: ...Getting Started with EPICenter EPICenter Reference Guide 44 ...
Page 100: ...The Inventory Manager EPICenter Reference Guide 100 ...
Page 140: ...The EPICenter Alarm System EPICenter Reference Guide 140 ...
Page 172: ...Configuration Manager EPICenter Reference Guide 172 ...
Page 196: ...The Firmware Manager EPICenter Reference Guide 196 ...
Page 220: ...The Interactive Telnet Feature EPICenter Reference Guide 220 ...
Page 250: ...The Grouping Manager EPICenter Reference Guide 250 ...
Page 276: ...Real Time Statistics EPICenter Reference Guide 276 ...
Page 342: ...Using the VLAN Manager EPICenter Reference Guide 342 ...
Page 348: ...The ESRP Monitor EPICenter Reference Guide 348 ...
Page 446: ...EPICenter Reports EPICenter Reference Guide 446 ...
Page 447: ...2 Advanced Upgrade Features ...
Page 448: ......
Page 480: ...EAPS Protocol Monitoring and Verification EPICenter Reference Guide 480 ...
Page 508: ...Using the Policy Manager EPICenter Reference Guide 508 ...
Page 525: ...3 Appendices ...
Page 526: ......
Page 542: ...EPICenter Backup EPICenter Reference Guide 542 ...
Page 564: ...Voice over IP Manager EPICenter Reference Guide 564 ...
Page 580: ...EPICenter Reference Guide 580 ...