Page 31 / 131 Scroll up to view Page 26 - 30
Add a new policy
Follow these steps to add a new outgoing policy.
Step 1.
Choose the
LAN->WAN
policy list from the available policy lists.
Step 2.
Click on the
Add new
link.
Step 3.
Fill in the following values:
Name:
Specifies a symbolic name for the rule. This name is used mainly as a rule
reference in log data and for easy reference in the policy list.
Action:
Select
Allow
to allow this type of traffic.
Source Nets:
– Specifies the sender span of IP addresses to be compared to the
received packet. Leave this blank to match everything.
Source Users/Groups:
Specifies if an authenticated username is needed for this policy to
match. Either make a list of usernames, separated by
,
or write
Any
for any authenticated
user. If it’s left blank there is no need for authentication for the policy.
Destination Nets:
Specifies the span of IP addresses to be compared to the destination
IP of the received packet.
Leave this blank to match everything.
Destination Users/Groups:
Specifies if an authenticated username is needed for this
policy to match. Either make a list of usernames, separated by
,
or write
Any
for any
authenticated user. If it’s left blank there is no need for authentication for the policy.
Service:
Either choose a predefined service from the dropdown menu or make a custom.
Schedule:
Choose what schedule should be used for this policy to match, choose Always
for no scheduling.
Step 4.
If using Traffic shaping fill in that information, if not skip this step.
Click the
Apply
button below to apply the change or click
Cancel
to discard changes
Page 32 / 131
32
Change order of policy
Follow these steps to change order of a policy.
Step 1.
Choose the policy list you would like do change order in from the available policy
lists.
Step 2.
Click on the
Edit
link on the rule you want to delete.
Step 3.
Change the number in the
Position
to the new line, this will after the apply button
is clicked move this policy to this row and move the old policy and all after to one step
down.
Click the
Apply
button below to apply the change or click
Cancel
to discard changes
Delete policy
Follow these steps to delete a policy.
Step 1.
Choose the policy list you would like do delete the policy in from the available
policy lists.
Step 2.
Click on the
Edit
link on the rule you want to delete.
Step 3.
Enable the
Delete policy
checkbox.
Click the
Apply
button below to apply the change or click
Cancel
to discard changes
Configure Intrusion Detection
Follow these steps to configure IDS on a policy.
Step 1.
Choose the policy you would like have IDS on.
Step 2.
Click on the
Edit
link on the rule you want to delete.
Step 3.
Enable the
Intrusion Detection / Prevention
checkbox.
Step 4.
Choose
Intrusion Detection
from the mode drop down list.
Step 5.
Enable the alerting checkbox for email alerting.
Click the
Apply
button below to apply the change or click
Cancel
to discard changes
Page 33 / 131
Configure Intrusion Prevention
Follow these steps to configure IDP on a policy.
Step 1.
Choose the policy you would like have IDP on.
Step 2.
Click on the
Edit
link on the rule you want to delete.
Step 3.
Enable the
Intrusion Detection / Prevention
checkbox.
Step 4.
Choose
Prevention
from the mode drop down list.
Step 5.
Enable the alerting checkbox for email alerting.
Click the
Apply
button below to apply the change or click
Cancel
to discard changes
Page 34 / 131
34
Port mapping / Virtual Servers
The Port mapping / Virtual Servers configuration section is where you can configure virtual
servers like Web servers on the DMZ or similar. It’s also possible to regulate how bandwidth
management, traffic shaping, is applied to traffic flowing through the WAN interface of the
firewall. It is also possible to use Intrusion Detection / Prevention and Traffic shaping on Port
mapped services, these are done in the same way as on policies, so see that chapter for
more information.
Mappings are read from top to bottom, and the first matching mapping is carried out.
Add a new mapping
Follow these steps to add a new mapping on the WAN interface.
Step 1.
Choose the
WAN
policy list from the available policy lists.
Step 2.
Click on the
Add new
link.
Step 3.
Fill in the following values:
Name:
Specifies a symbolic name for the rule. This name is used mainly as a rule
reference in log data and for easy reference in the policy list.
Source Nets:
Specify the source networks, leave blank for everyone (0.0.0.0/0).
Source Users/Groups:
Specifies if an authenticated username is needed for this
mapping to match. Either make a list of usernames, separated by
,
or write
Any
for any
authenticated user. If it’s left blank there is no need for authentication for the policy.
Destination Nets:
Leave empty for the interfaces own IP or enter a new IP if using Virtual
IP.
Service:
Either choose a predefined service from the dropdown menu or make a custom.
Pass To:
The IP of the server that the traffic should be passed to.
Schedule:
Choose what schedule should be used for this mapping to match, choose
Always for no scheduling.
Step 4.
If using Traffic shaping fill in that information, if not skip this step.
Click the
Apply
button below to apply the change or click
Cancel
to discard changes
Page 35 / 131
Delete mapping
Follow these steps to delete a mapping.
Step 1.
Choose the mapping list (WAN, LAN or DMZ) you would like do delete the
mapping from.
Step 2.
Click on the
Edit
link on the rule you want to delete.
Step 3.
Enable the
Delete mapping
checkbox.
Click the
Apply
button below to apply the change or click
Cancel
to discard changes.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top