
274
Controlling traffic at the security gateway
Understanding and using rules
3
In the Rule Properties dialog box, on the General tab, do the following:
4
Optionally, make your rule more specific by using the tabs of the Rule Properties dialog box to do
any of the following:
■
Enforce time-based access restrictions
■
Apply alert thresholds
■
Add authentication
■
Add content security checks
■
Specify advanced service parameters for nonstandard services
Procedures for these tasks are contained in the sections that follow.
5
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
6
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
■
“Enforcing time-based access restrictions”
■
“Applying alert thresholds to rules”
Enable
To enable the new rule, check Enable.
Rule name
Type a unique name for the rule.
Number
This read-only field displays the rule’s number, which is automatically generated
when you save the rule.
Caption
Type a brief description of the rule.
Action
In this drop-down list, select one of the following:
■
To create a rule that allows traffic, select Allow.
■
To create a rule that denies traffic, select Deny.
Arriving through
Select the security gateway interface or VPN tunnel that serves as the entry point
for the traffic defined by this rule.
To create a new network interface, you must run the System Setup Wizard; however,
you can edit the properties of an existing network interface.
Source
Select the network entity that is the source for the traffic defined by this rule.
Destination
Select the network entity that is the destination for the traffic defined by this rule.
Leaving through
Select the security gateway interface or VPN tunnel through which the rule’s traffic
will travel on the outbound path.
Service group
Select the service group that defines the protocols that make up the traffic defined
for this rule.
Time range
Optionally, select a time range.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...