Using Port-Based Security
Chapter 12: Setting Your Security Policy
247
Changing Firewall Rules' Priority
To change a firewall rule's priority
1.
Click
Security
in the main menu, and click the
Rules
tab.
The
Rules
page appears.
2.
Do one of the following:
Click
next to the desired rule, to move the rule up in the table.
Click
next to the desired rule, to move the rule down in the table.
The rule's priority changes accordingly.
Viewing and Deleting Firewall Rules
To view or delete an existing firewall rule
1.
Click
Security
in the main menu, and click the
Rules
tab.
The
Rules
page appears with a list of existing firewall rules.
2.
To view a rule's description, mouse-over the information icon in the desired rule's row.
A tooltip displays the rule's description.
3.
To delete a rule, do the following.
a.
In the desired rule's row, click the Erase
icon.
A confirmation message appears.
b.
Click
OK
.
The rule is deleted.
Using Port-Based Security
The IP60 appliance supports the IEEE 802.1x standard for secure RADIUS authentication of users and
devices that are directly attached to IP60 appliance's LAN and DMZ ports, as well as the wireless LAN.
When an 802.1x security scheme is implemented for a port, users attempting to connect to that port are
required to authenticate using their network user name and password. The IP60 appliance sends the user's
credentials to the configured RADIUS server, and if authentication succeeds, a connection is established. If
the user fails to authenticate, the port is physically isolated from other ports on the gateway.
Summary of Contents for IP60 - Security Appliance
Page 1: ...Part No N450000643 Rev 001 Published February 2008 Nokia IP60 Security Appliance User Guide ...
Page 4: ...4 Nokia IP60 Security Appliance User Guide ...
Page 10: ......
Page 12: ......
Page 38: ......
Page 58: ......
Page 108: ......
Page 268: ......
Page 482: ......