161
Defining your security environment
Defining traffic endpoints with network entities
■
An inside or outside host running a custom database application to which you must permit access,
such as an authentication server
■
An internal or external computer that requires special privileges
When defining these hosts, you should assign names and provide captions that make them easy to
identify in the log files.
Once defined, you can use host network entities to specify the source or destination of traffic in rules
and packet filters. You can also use a host network entity as the local or remote endpoints in VPN
tunnels.
Prerequisites
None.
To configure a single computer with a host network entity
1
In the SGMI, in the left pane, under Assets, click
Network
.
2
In the right pane, on the Network Entities tab, click
New > Host Network Entity
.
3
In the host network entities properties dialog box, on the General tab, do the following:
4
Optionally, on the Spoof Protection tab, apply spoof protection to the host network entity by
specifying which interfaces are associated with it.
In the Available list, select one or more interfaces. To associate them with the host network entity,
click the right-arrow >> button, which moves them to the Selected list.
To remove an association, in the Selected list, select an interface and click the left-arrow << button
to move it to the Available list.
5
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
6
Click
OK
.
7
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
8
Use the host network entity for any of the following:
■
To specify the source or destination of traffic in rules and packet filters.
■
To specify the local or remote endpoint in an IPsec static or gateway-to-gateway VPN tunnel.
■
To specify the local endpoint in a Client VPN tunnel.
Related information
For further information related to this topic, see the following:
■
“Host Network Entity Properties—General tab”
■
“Host Network Entity Properties—Spoof Protection tab”
■
Entity name
Type a name for the host network entity.
Network address
Type the IP address or fully-qualified domain name of the host.
MAC address
Optionally, type the MAC address of the host.
Caption
Type a brief description of the host network entity.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...