Chapter 4.2 Users
71
¾
Rule Number:
This is the
rule selected “1”. Rule No. 1 has the highest priority; rule No. 2 has
the second priority, and so on.
¾
Rule Name:
The rule name can be changed here.
¾
Source/Destination – Interface/Zone:
There are choices of
ALL, WAN1
,
WAN2
,
Default
,
and the named
Service Zones
to be applied for the traffic interface.
¾
Source/Destination – IP Address/Domain Name:
Select the source and destination IP
addresses.
¾
Source/Destination – Subnet Mask:
Enter the source and destination subnet masks.
¾
Source- MAC Address:
The MAC address of the source IP address. This is for specific MAC
address filter.
¾
Source/Destination – IPSec Encrypted:
Check the box for only filtering on the encrypted
traffic.
¾
Service Protocol:
There are defined protocols in the
service protocols list
to be selected.
¾
Schedule:
When schedule is selected, clients assigned with this policy are applied the firewall
rule only within the time checked. There are three options,
Always
,
Recurring
and
One Time.
Recurring
is set with the hours within a week.
¾
Action for Matched Packets:
There are two options,
Block
and
Pass
.
Block
is to prevent
packets from passing and
Pass
is to permit packets passing.
B. Specific Route Profile:
Click the button of
Setting
for
Specific Route Profile
, the Specific Route Profile
list will appear.
The
Default Gateway
of WAN1, WAN2, or a desired IP address can be defined in a policy. When
Default
Gateway
is enabled, all clients applied this policy will access the Internet through this default gateway.
¾
Enable:
Check this option to apply the
Default Gateway
.
Содержание DSA-3600
Страница 1: ...DSA 3600 User Guide Version DSA 3600 3 00 December 2007 ...
Страница 6: ......
Страница 22: ...Chapter 4 Web Interface Configuration 16 ...
Страница 24: ...Chapter 4 Web Interface Configuration 18 ...
Страница 39: ...Chapter 4 1 System 33 An example of Template Login Page ...
Страница 121: ...Chapter 4 4 Network 115 ...
Страница 123: ...Chapter 4 5 Status 117 4 5 1 System This section provides an overview of the system administration ...
Страница 143: ...Chapter 4 6 Tools 137 Figure 4 6 1a An example using Tag Based service zones ...
Страница 162: ...Appendix C Proxy Configuration 156 setting ...