
270
Controlling traffic at the security gateway
Creating rules and filters to control traffic through the firewall
For more information, see the following topics:
■
“Understanding and using rules”
■
“Using packet filters to allow or deny traffic”
■
“Blocking inappropriate content with content filtering”
■
“Providing remote access using VPN tunnels”
■
“Enabling remote access with clientless VPN”
Creating rules and filters to control traffic through the firewall
You create rules and filters to protect your resources from attack while making them available to
trusted users. These rules control how traffic passes through the firewall component of the security
gateway.
Controlling traffic through the firewall involves defining your network and the resources to which you
want to provide access and protection, configuring the content security components of the security
gateway, and creating the rules and packet filters that use these components.
To control traffic, you complete the following tasks:
VPN tunnels
The Virtual Private Network (VPN) feature provides secure access through the security
gateway for remote users. The security gateway’s VPN functionality lets you create
encrypted tunnels for gateway-to-gateway communication and remote access for users who
have installed Symantec Client VPN on their computers. By adding a filter to a VPN policy,
you can further control the traffic.
Clientless VPN rules Clientless VPN gives any external user with a Web browser secure, controlled access to your
organization’s internal resources. Users who connect by way of clientless VPN do not have
to install software on their computers. You create role settings that specify the rules and
login privileges that control user access.
Set up your network topography.
See the following:
■
“Defining security gateway routing”
■
“Configuring resource records for the security
gateway”
Identify the resources that your rules will make
available.
“Defining traffic endpoints with network entities”
Create service groups that contain the protocols used
to pass traffic.
Enable the security gateway to pass specific kinds of
traffic by modifying the proxies that are used with the
protocols.
“Controlling full application inspection of traffic”
Specify the time periods during which rules are in
effect.
“Blocking inappropriate content with content
Create user accounts and user groups for
authentication.
See the following:
■
“Configuring users for internal authentication”
■
“Configuring user groups for internal and external
authentication”
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...