Symantec 360R Administration Guide - Page 63

Network traffic control, Planning network access

Page 63 highlights

5 Chapter Network traffic control This chapter includes the following topics: ■ Planning network access ■ Understanding computers and computer groups ■ Defining inbound access ■ Defining outbound access ■ Configuring services ■ Configuring special applications ■ Configuring advanced options The Symantec Gateway Security 300 Series appliance includes firewall technology that let you configure the firewall component to meet your security policy requirements. When configuring the firewall, identify all computers (nodes) to be protected on your network. Note: This chapter uses the terms computers. A computer is defined as anything that has its own IP address; for example: a terminal server, network photocopier, desktop PC, laptop, server, print server, and so on. Planning network access Developing a security policy helps you identify what you need to configure. See the Symantec Gateway Security 300 Series Installation Guide. Before configuring the security gateway, consider the following: ■ Learn about computers and computer groups. See "Understanding computers and computer groups" on page 64.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

Chapter
5
Network traffic control
This chapter includes the following topics:
Planning network access
Understanding computers and computer groups
Defining inbound access
Defining outbound access
Configuring services
Configuring special applications
Configuring advanced options
The Symantec Gateway Security 300 Series appliance includes firewall
technology that let you configure the firewall component to meet your security
policy requirements. When configuring the firewall, identify all computers
(nodes) to be protected on your network.
Note:
This chapter uses the terms computers. A computer is defined as anything
that has its own IP address; for example: a terminal server, network
photocopier, desktop PC, laptop, server, print server, and so on.
Planning network access
Developing a security policy helps you identify what you need to configure. See
the
Symantec Gateway Security 300 Series Installation Guide
.
Before configuring the security gateway, consider the following:
Learn about computers and computer groups. See
“Understanding
computers and computer groups”
on page 64.