Symantec 360R Administration Guide - Page 65

Defining computer group membership, To con computers - 360 review

Page 65 highlights

Network traffic control 65 Understanding computers and computer groups Defining computer group membership Configuring computers is the first step in configuring the firewall component of the appliance. When creating your security policy, assign the largest group of hosts to the Everyone computer group to minimize the input and management of MAC addresses. By default, all hosts belong to the Everyone computer group until you configure them to one of the four other computer groups. Review your security policy to determine how many computer groups you need (if any) and which users should be assigned to each computer group. The Computers tab lets you identify each computer by typing its MAC address, assign a static IP address, assign it to a computer group, and bind it to a PPPoE session (if your ISP offers multiple PPPoE sessions). See "PPPoE" on page 31. Note: To find the MAC address of a Microsoft Windows-based computer, at a DOS prompt, type ipconfig /all and look for the physical address. On models 360 and 360R, you can restrict the computer to using only one of the WAN ports. This is useful if you have two broadband accounts, one on each WAN port, and you want a particular computer to use only one. This is useful for servers or applications that must always use a specific WAN IP address such as FTP. The default is disabled. To configure computers If you are using an ISP with PPPoE sessions, you bind a host to a session (WAN IP) on this tab. To stop the configuration process, you can click Cancel at anytime while configuring computers. To clear all the information from the tab, you can click Clear Form at any time. Checking Reserve Host ensures that the DHCP server always offers the defined IP address to the computer you are defining, or you can set this IP address as a static address on the computer. See "Computers tab field descriptions" on page 177. To configure a new computer 1 In the left pane, click Firewall. 2 On the Computers tab, in the Host Name text box, type a host name. 3 In the Adapter (MAC) Address text box, type the address of the host's network interface card (NIC).

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

65
Network traffic control
Understanding computers and computer groups
Defining computer group membership
Configuring computers is the first step in configuring the firewall component of
the appliance.
When creating your security policy, assign the largest group of hosts to the
Everyone computer group to minimize the input and management of MAC
addresses. By default, all hosts belong to the Everyone computer group until you
configure them to one of the four other computer groups.
Review your security policy to determine how many computer groups you need
(if any) and which users should be assigned to each computer group.
The Computers tab lets you identify each computer by typing its MAC address,
assign a static IP address, assign it to a computer group, and bind it to a PPPoE
session (if your ISP offers multiple PPPoE sessions). See
“PPPoE”
on page 31.
Note:
To find the MAC address of a Microsoft Windows-based computer, at a
DOS prompt, type
ipconfig /all and look for the physical address.
On models 360 and 360R, you can restrict the computer to using only one of the
WAN ports. This is useful if you have two broadband accounts, one on each
WAN port, and you want a particular computer to use only one. This is useful for
servers or applications that must always use a specific WAN IP address such as
FTP. The default is disabled.
To configure computers
If you are using an ISP with PPPoE sessions, you bind a host to a session (WAN
IP) on this tab.
To stop the configuration process, you can click Cancel at anytime while
configuring computers. To clear all the information from the tab, you can click
Clear Form at any time.
Checking Reserve Host ensures that the DHCP server always offers the defined
IP address to the computer you are defining, or you can set this IP address as a
static address on the computer.
See
“Computers tab field descriptions”
on page 177.
To configure a new computer
1
In the left pane, click
Firewall
.
2
On the Computers tab, in the Host Name text box, type a host name.
3
In the Adapter (MAC) Address text box, type the address of the host’s
network interface card (NIC).