Page 191 / 428
Scroll up to view Page 186 - 190
Using Firewall Rules
Chapter 10: Setting Your Security Policy
177
The
ZoneAlarm Firewall Rule
wizard opens, with the
Step 1: Rule Type
dialog box
displayed.
3.
Select the type of rule you want to create.
4.
Click
Next
.
The
Step 2: Service
dialog box appears.
The example below shows an Allow and Forward rule.
Page 192 / 428
Using Firewall Rules
178
Check Point ZoneAlarm User Guide
5.
Complete the fields using the relevant information in the following table.
6.
Click
Next
.
The
Step 3: Destination & Source
dialog box appears.
7.
To configure advanced settings, click
Show Advanced Settings
.
New fields appear.
Page 193 / 428
Using Firewall Rules
Chapter 10: Setting Your Security Policy
179
8.
Complete the fields using the relevant information in the following table.
9.
Click
Next
.
The
Step 4: Rule Options
dialog box appears.
10.
Complete the fields using the relevant information in the following table.
11.
Click
Next
.
Page 194 / 428
Using Firewall Rules
180
Check Point ZoneAlarm User Guide
The
Step 5: Done
dialog box appears.
12.
If desired, type a description of the rule in the field provided.
13.
Click
Finish
.
The new rule appears in the
Rules
page.
Table 33: Firewall Rule Fields
In this field…
Do this…
Any Service
Click this option to specify that the rule should apply to any service.
Standard
Service
Click this option to specify that the rule should apply to a specific standard
service or a network service object.
You must then select the desired service or network service object from the
drop-down list.
Custom Service
Click this option to specify that the rule should apply to a specific non-
standard service.
The
Protocol
and
Port Range
fields are enabled. You must fill them in.
Page 195 / 428
Using Firewall Rules
Chapter 10: Setting Your Security Policy
181
In this field…
Do this…
Protocol
Select the protocol for which the rule should apply (ESP, GRE, TCP, UDP,
ICMP, IGMP, or OSPF).
To specify that the rule should apply for any protocol, select
ANY
.
To specify a protocol by number, select
Other
. The
Protocol Number
field
appears.
Port Range
To specify the port range to which the rule applies, type the start port
number in the left text box, and the end port number in the right text box.
Note:
If you do not enter a port range, the rule will apply to all ports. If you
enter only one port number, the range will include only that port.
Protocol
Number
Type the number of the protocol for which the rule should apply.
Source
Select the source of the connections you want to allow/block.
To specify an IP address, select
Specified IP
and type the desired IP address
in the field provided.
To specify an IP address range, select
Specified Range
and type the desired
IP address range in the fields provided.