158 C
HAPTER
11: A
DMINISTRATION AND
A
DVANCED
O
PERATIONS
■
Does this rule conflict with any existing rules?
Once you have answered these questions, to add rules you type the
information into the correct boxes in the Policy Rules window.
a Action
Select the Allow or Deny option button depending on the intent of
the rule, as defined by item 2 in the “Using Network Access Policy
Rules” on page 157.
b Service
From the Service menu, select the IP protocol, as defined by item 4 in
the “Using Network Access Policy Rules” on page 157. If the protocol
is not listed, it is necessary to first define it in the Add Service window.
c Source
There are three parameters to configure for the Source item.
■
Select the Network Access Rule’s source port, LAN, WAN,orDMZ,
if appropriate, from the Ethernet menu.
■
If there are IP address restrictions on the source of the traffic, such
as keeping competitors off the company’sWebsite,typethe
starting and ending IP addresses of the range in the Addr. Range
Begin and Addr. Range End, respectively.
■
If all IP addresses are affected, type
*
in the Addr. Range Begin box.
d Destination
There are three parameters to configure for the Destination item.
■
Select the Network Access Rule’s destination port, LAN, WAN,or
DMZ, if appropriate, from the Ethernet menu.
■
If there are IP address restrictions on the destination of the traffic,
such as limiting Telnet to a remote site, type the starting and
ending IP addresses of the range in the Addr. Range Begin and
Addr. Range End, respectively.
■
If all IP addresses are affected, type
*
in the Addr. Range Begin box.
Understanding the
Rule Hierarchy
The rule hierarchy has two basic concepts:
■
Specific rules override general rules.
■
Equally specific Deny rules override Allow rules.
DUA1611-0AAA02.book Page 158 Thursday, August 2, 2001 4:01 PM
Comentarios a estos manuales