Chapter 4.2 Users
67
b. Firewall Rules:
Click the number of
Filter Rule No.
to edit individual rules and click
Apply
to save
the settings. The rule status will show on the list. Check
“Active”
box and click
Apply
to enable that
rule.
This link leads to the Firewall Rules page. Rule No.1 has the highest priority; Rule No.2 has the
second priority and so on. Each firewall rule is defined by Source, Destination and Pass/Block action.
Optionally, a Firewall Rule Schedule can be set to specify when the firewall rule is enforced. It can be
set to Always, Recurring or One Time.
Selecting the Filter Rule Number 1 as the example:
¾
Rule Number:
This is the
rule selected “1”. Rule No. 1 has the highest priority; rule No. 2 has
the second priority, and so on.
¾
Rule Name:
The rule name can be changed here.
¾
Source/Destination – Interface/Zone:
There are choices of
ALL, WAN1
,
WAN2
,
Default
,
and the named
Service Zones
to be applied for the traffic interface.
¾
Source/Destination – IP Address/Domain Name:
Enter the source and destination IP
addresses. Domain Host filtering is supported but Domain name filtering is not.
¾
Source/Destination – Subnet Mask:
Select the source and destination subnet masks.
¾
Source- MAC Address:
The MAC Address of the source IP address. This is for specific MAC
address filter.
¾
Source/Destination – IPSec Encrypted:
Check the box for only filtering on the encrypted
traffic.
¾
Service Protocol:
There are defined protocols in the
service protocols list
to be selected.
¾
Schedule:
When schedule is selected, clients assigned with this policy are applied the firewall
rule only within the time checked. There are three options,
Always
,
Recurring
and
One Time.
Recurring
is set with the hours within a week.
Содержание DSA-3600
Страница 1: ...DSA 3600 User Guide Version DSA 3600 3 00 December 2007 ...
Страница 6: ......
Страница 22: ...Chapter 4 Web Interface Configuration 16 ...
Страница 24: ...Chapter 4 Web Interface Configuration 18 ...
Страница 39: ...Chapter 4 1 System 33 An example of Template Login Page ...
Страница 121: ...Chapter 4 4 Network 115 ...
Страница 123: ...Chapter 4 5 Status 117 4 5 1 System This section provides an overview of the system administration ...
Страница 143: ...Chapter 4 6 Tools 137 Figure 4 6 1a An example using Tag Based service zones ...
Страница 162: ...Appendix C Proxy Configuration 156 setting ...