HP X Unified Security Platform Series Bedienungsanleitung Seite 85

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 333
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 84
How Firewall Rule Enforcement Works
X Family LSM User’s Guide V 2.5.1 69
The following figure shows the Firewall Rules page.
You can complete the following tasks from the Firewall Rules page:
•Create/Edit a firewall rule
Delete a firewall rule
Filter the Firewall Rules List to display only those configured for a user-specified Source and
Destination zone.
When the Firewall Rules List is filtered, the LSM only shows filters that match the criteria selected
in the Filter Firewall Rules by Zone filter options.
Firewall Rules List Details
The Firewall Rules List page displays the following information for each rule in the list:
Figure 4–2: FIREWALL - Firewall Rules Page
Table 4–2: Firewall Rules List Details
Column Description
ID A unique ID system-assigned to the firewall rule.
Action The action that will be applied when this firewall rule is matched for a given
session. Either Permit or Block or Web Filter.
Source Zone
(Addresses)
Indicates the Source Security Zone for the session request. By default, the source
zone includes all IP addresses within the given zone. If the firewall rule has been
configured to apply only to a subset of IP addresses, the subset (IP address
group, subnet, IP address range) is displayed.
Destination
Zone
(Addresses)
This field indicates the destination security zone where traffic will be directed if
it is permitted. By default, the destination zone includes all IP addresses within
the given zone. If the firewall rule has been configured to send permitted traffic
to only a subset of IP addresses, the subset (IP address group, subnet, IP address
range) is displayed.
Seitenansicht 84
1 2 ... 80 81 82 83 84 85 86 87 88 89 90 ... 332 333

Kommentare zu diesen Handbüchern

Keine Kommentare