Alto MS Series User Manual Page 39

  • Download
  • Add to my manuals
  • Print
  • Page
    / 108
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 38
Getting Started Guide 35
Create the Security Perimeter Security Perimeter Overview
Field Description
Required
Fields
Name
A label that supports up to 31 characters, used to identify the rule.
Source Zone
The zone from which the traffic originates.
Destination Zone
The zone at which the traffic terminates. If you use NAT, make sure
to always reference the post-NAT zone.
Application
The application which you wish to control. The firewall uses
App-ID, the traffic classification technology, to identify traffic on
your network. App-ID provides application control and visibility in
creating security policies that block unknown applications, while
enabling, inspecting, and shaping those that are allowed.
Action
Specifies an Allow or Deny action for the traffic based on the criteria
you define in the rule.
Optional
Fields
Tag
A keyword or phrase that allows you to filter security rules. This is
handy when you have defined many rules and wish to then review
those that are tagged with a particular keyword or color, for example
Inbound to DMZ.
Description
A text field, up to 255 characters, used to describe the rule.
Source Address
Define host IP or FQDN, subnet, named groups, or country-based
enforcement. If you use NAT, make sure to always refer to the
original IP addresses in the packet (i.e. the pre-NAT IP address).
Destination Address
The location or destination for the traffic. If you use NAT, make sure
to always refer to the original IP addresses in the packet (i.e. the
pre-NAT IP address).
Source User
The user or group of users for whom the policy applies. You must
have User-ID enabled on the zone. See Configure User
Identification for details.
Page view 38
1 2 ... 34 35 36 37 38 39 40 41 42 43 44 ... 107 108

Comments to this Manuals

No comments