
181
Defining your security environment
Understanding how protocols affect traffic
4
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
5
Click
OK
.
6
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
7
Do one of the following:
■
To use the protocol in a rule, add it to a service group, and use the service group in a rule.
■
To use the protocol in a packet filter, specify the entry direction associated with the protocol.
■
To use the protocol with IDS/IPS, add it to an IDS/IPS service.
Related information
For further information related to this topic, see the following:
■
“TCP UDP Based Protocol Properties—General tab”
■
■
“Enabling a new protocol to trigger IDS/IPS events”
■
Configuring ICMP-based protocols
You use the Internet Control Message Protocol (ICMP) to send error and control messages about
routing problems or simple inter-network exchanges like timestamp or echo transactions to verify
connections between TCP/IP hosts.
Prerequisites
None.
To configure ICMP-based protocols
1
In the SGMI, in the left pane, under Assets, click
Protocols
.
2
In the right pane, on the Protocols tab, click
New > ICMP Based Protocol
.
Source port use
Select whether a port range or a single port will be used as the protocol’s source port.
Source low port
If you selected to use a port range, type the port number at the lower end of the
range of the protocol’s source ports.
If you selected to use a single port, type the port to be used as the source port.
Specifying no port here means any port.
Source high port
If you selected to use a port range, type the port number at the upper end of the
range of the protocol’s source ports.
If you selected to use a single port, this field is greyed out.
Specifying no port here means any port.
Use GSP
Check this option to enable the custom protocol to use the GSP proxy.
Use native service
Check this option to use the native service.
Native service port
If you enabled native service, type the port number to be used, or leave the default
that is automatically calculated for you.
Caption
Type a brief description of the protocol.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...