Symantec 360R Administration Guide - Page 64

Understanding computers and computer groups

Page 64 highlights

64 Network traffic control Understanding computers and computer groups ■ What kinds of users will be protected by the security gateway? Will all users have the same access and privileges? ■ What types of services do you want to make available to internal users? ■ What standard application services do you want to make available to external users? ■ What types of special application services do you want to allow for external users and hosts? Understanding computers and computer groups Computers are all nodes behind the appliance. This includes permanent resident laptops on the LAN, application servers, and any host or printer. You configure the appliance to recognize the computer by its MAC (physical) address. Computer groups let you create outbound rules and apply them to computers who should have the same access. Instead of creating a traffic rule for each individual computer in your network, you define computer groups, assign each computer to a computer group, and then create rules for the group. By default, all computers are part of the Everyone group and have no restrictions on Internet use until they are assigned to another computer group which has traffic rules configured. You can create rules that apply to the Everyone group, or, for greater control, you can divide the computers into one of four computer groups, and then assign each group different rules. If a computer is not defined in the computers table, it belongs to the Everyone computer group. Note: The appliance has five computer groups: Everyone, Group 1, Group 2, Group 3, and Group 4. You cannot add, delete, or rename computer groups. Before you create inbound and outbound rules to govern traffic, perform the following tasks in this order: ■ Define the computer groups. See "Defining computer group membership" on page 65. ■ Define computers behind the appliance and assign them to computer groups. See "Defining computer group membership" on page 65.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

64
Network traffic control
Understanding computers and computer groups
What kinds of users will be protected by the security gateway? Will all users
have the same access and privileges?
What types of services do you want to make available to internal users?
What standard application services do you want to make available to
external users?
What types of special application services do you want to allow for external
users and hosts?
Understanding computers and computer groups
Computers are all nodes behind the appliance. This includes permanent resident
laptops on the LAN, application servers, and any host or printer. You configure
the appliance to recognize the computer by its MAC (physical) address.
Computer groups let you create outbound rules and apply them to computers
who should have the same access. Instead of creating a traffic rule for each
individual computer in your network, you define computer groups, assign each
computer to a computer group, and then create rules for the group.
By default, all computers are part of the Everyone group and have no
restrictions on Internet use until they are assigned to another computer group
which has traffic rules configured. You can create rules that apply to the
Everyone group, or, for greater control, you can divide the computers into one of
four computer groups, and then assign each group different rules. If a computer
is not defined in the computers table, it belongs to the Everyone computer
group.
Note:
The appliance has five computer groups: Everyone, Group 1, Group 2,
Group 3, and Group 4. You cannot add, delete, or rename computer groups.
Before you create inbound and outbound rules to govern traffic, perform the
following tasks in this order:
Define the computer groups.
See
“Defining computer group membership”
on page 65.
Define computers behind the appliance and assign them to computer
groups.
See
“Defining computer group membership”
on page 65.