
282
Controlling traffic at the security gateway
Understanding and using rules
Prerequisites
Complete the following tasks before beginning this procedure:
■
Create a subnet entity to represent the internal subnet
See
“Defining a network or subnet with a subnet entity”
■
Create a host entity to represent the public service
See
“Configuring a single computer with a host network entity”
■
Create a service group that contains the protocol required to exchange information with the public
service
To grant internal users access to public services
1
In the SGMI, in the left pane, under Policy, click
Firewall
.
2
In the right pane, on the Rules tab, click
New
.
3
In the rule properties dialog box, on the General tab, do the following:
4
On the Antivirus tab, to enable scanning of SMTP, POP3, HTTP, or FTP files, check the desired
protocol, and then under each, select the antivirus features to be used.
5
On the Content Filtering tab, in the Content profile drop-down list, select a content profile.
6
Under Select the protocols and settings to apply content filter scanning, do any of the following:
■
To enable HTTP, check HTTP, and then check the HTTP restrictions you want to enable.
■
To enable newsgroups, check NNTP, and then in the Newsgroup profile drop-down list, select
the newsgroup profile.
7
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
8
Click
OK
.
9
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Enable
To enable the new rule, check
Enable
.
Rule name
Type a unique name for the rule.
Caption
Type a brief description of the rule, identifying the public service to which you are
providing access.
Action
In this drop-down list, select
Allow
.
Arriving through
Select an inside interface.
Source
Select the subnet entity of the internal subnet.
Destination
Select host network entity of the external service.
Leaving through
Select
an outside interface.
Service group
Select or create a service group that contains the protocol required to exchange
information with the public service.
For example, to access an external web server, select the Web service group.
Time range
Optionally, select a time range during which the internal users can access the public
service.
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...