Alto MS Series User Manual Page 53

  • Download
  • Add to my manuals
  • Print
  • Page
    / 108
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 52
Getting Started Guide 49
Create the Security Perimeter Set Up Basic Security Policies
Define Basic Security Rules
Step 1 Permit Internet access for all users on the
enterprise network.
Zone: Trust to Untrust
Note By default, the firewall includes a security
rule named rule1 that allows all traffic
from Trust zone to Untrust zone. You can
either delete the rule or modify the rule to
reflect your zone-naming convention.
To safely enable applications that are required for day-to-day
business operations we will create a simple rule that allows access to
the Internet. To provide basic threat protection, we will attach the
default security profiles available on the firewall.
1. Select
Policies > Security and click Add.
2. Give the rule a descriptive name in the General tab.
3. In the
Source tab, set the Source Zone to Trust.
4. In the
Destination tab, Set the Destination Zone to Untrust.
Note To scan policy rules and visually identify the zones on each
rule, create a tag with the same name as the zone. For
example, to color code the Trust zone as green, select
Objects > Tags, click Add and Name the tag Trust, and
select the
Color green.
5. In the
Service/ URL Category tab, select service-http and
service-https.
6. In the
Actions tab, complete these tasks:
a. Set the
Action Setting to Allow.
b. Attach the default profiles for antivirus, anti-spyware,
vulnerability protection and URL filtering, under
Profile
Setting.
7. Verify that logging is enabled at the end of a session under
Options. Only traffic that matches a security rule will be logged.
Step 2 Permit users on the internal network to
access the servers in the DMZ.
Zone: Trust to DMZ
Note If using IP addresses for configuring
access to the servers in the DMZ, make
sure to always refer to the original IP
addresses in the packet (i.e. the pre-NAT
addresses), and the post-NAT zone.
1. Click
Add in the Policies > Security section.
2. Give the rule a descriptive name in the
General tab.
3. In the
Source tab, set the Source Zone to Trust.
4. In the
Destination tab, set the Destination Zone to DMZ.
5. In the
Service/ URL Category tab, make sure the Service is set
to
application-default.
6. In the
Actions tab, set the Action Setting to Allow.
7. Leave all the other options at the default values.
Page view 52
1 2 ... 48 49 50 51 52 53 54 55 56 57 58 ... 107 108

Comments to this Manuals

No comments