
590
Field descriptions
Policy field descriptions
Arriving through
The interface or tunnel through which the traffic arrives.
All interfaces or tunnels configured on the security gateway appear in the drop-down list.
In addition to any interfaces or tunnels you have created, the drop-down list contains the
following options:
■
<ANY>
Select this option if you do not want to specify a particular interface or tunnel.
This is the default option.
■
<ANY IPSEC VPN>
Applies the rule to traffic arriving through an IPsec tunnel, when you do not want to
specify a particular tunnel.
■
<ANY WEBVPN>
Applies the rule to traffic arriving through a WebVPN clientless tunnel, when you do
not want to specify a particular tunnel.
This includes SquirrelMail but does not include clientless VPN file sharing.
■
<ANY PORT FORWARDER>
Applies the rule to traffic arriving through port forwarding, when you do not want to
specify a particular port forwarder.
This includes secure desktop mail traffic.
■
<ANY SECURE NETWORK CONNECTOR>
Applies the rule to traffic arriving through a secure network connection, when you do
not want to specify a particular connection.
Source
A network entity that represents the source of the traffic.
The default selection is (none). A source must be specified for the rule to be created.
The source of traffic must be one of the following:
■
Security gateway network entity
A security gateway address and IKE information related to the security gateway, such
as whether IKE policies are used, and the use of certificates or shared secrets.
■
Network entity group
A collection of other network entities, such as hosts, domains, and subnets. When
multiple hosts require similar rules, you can create a rule that uses a network entity
group instead of creating separate rule for each network entity.
■
Subnet network entity
A grouping of hosts defined by a network address and subnet mask. You typically use
subnet entities to define whole networks, or subnetworks within a particular IP
address range.
■
Host network entity
A single host, located either on the network protected by the security gateway or on
the public network outside of the security gateway.
■
VPN security entity
A network entity/security gateway pairing or a user account/security gateway pairing.
■
Domain name network entity
Represents a group of computers that share the network portion of their host names.
Domain name network entities are registered within the Internet community.
■
Universe network entity
The security gateway ships with a subnet entity called Universe. The Universe subnet
entity has an IP address of 0.0.0.0 and a subnet mask of /0. The Universe subnet
entity is similar to a wildcard that defines the set of all valid IP addresses. You can use
this entity in rules that apply to any IP address, but you should only use it in these
rules when any host can have access.
Note:
When you choose a specific tunnel for the Arriving through field, the user or user
group specified as the remote end point of the tunnel is automatically be filled in as the
source and cannot be changed.
Table D-24
Rule Properties—General tab (Continued)
Field
Description
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...