Symantec 360R Administration Guide - Page 66

Reserve Host, Firewall, Update, Delete, Under Session Association

Page 66 highlights

66 Network traffic control Understanding computers and computer groups 4 If the computer is an application server to which you want to allow access to an inbound rule, or to reserve an IP address for a computer that is not an application server, under Application Server, check Reserve Host. See "Defining inbound access" on page 68. 5 In the IP Address text box, type the IP address of the host. 6 Under Computer Group, on the Computer Group drop-down list, select a group for your host to join. The computer group properties are defined on the Firewall > Computer Groups tab. See "Defining inbound access" on page 68. 7 Under Session Association, in the Bind with PPPoE Session drop-down list, select the session to bind to this host. You must have a multi-session PPPoE account with your ISP if you want to bind a host to a PPPoE session. If you do not have an PPPoE account with your ISP, leave the Bind with PPPoE Session drop-down list at Session 1. 8 Click Add. To verify that a host has been configured, you can check the Host List displayed at the bottom of the window. The fields in the list map to the fields entered when you configured the host. Once you have finished adding computers to an computer group, you can configure the properties for each computer group. To update an existing computer 1 In the left pane, click Firewall. 2 In the right pane, on the Computers tab, under Host Identity, in the Select Host drop-down list, select a host. 3 Make the changes to the computers fields. 4 Click Update. The updated computer is displayed in the Host List. To delete an existing computer 1 In the left pane, click Firewall. 2 In the right pane, on the Computers tab, under Host Identity, in the Select Host drop-down list, select a host. 3 Click Delete.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

66
Network traffic control
Understanding computers and computer groups
4
If the computer is an application server to which you want to allow access to
an inbound rule, or to reserve an IP address for a computer that is not an
application server, under Application Server, check
Reserve Host
.
See
“Defining inbound access”
on page 68.
5
In the IP Address text box, type the IP address of the host.
6
Under Computer Group, on the Computer Group drop-down list, select a
group for your host to join.
The computer group properties are defined on the Firewall > Computer
Groups tab. See
“Defining inbound access”
on page 68.
7
Under Session Association, in the Bind with PPPoE Session drop-down list,
select the session to bind to this host.
You must have a multi-session PPPoE account with your ISP if you want to
bind a host to a PPPoE session. If you do not have an PPPoE account with
your ISP, leave the Bind with PPPoE Session drop-down list at Session 1.
8
Click
Add.
To verify that a host has been configured, you can check the Host List displayed
at the bottom of the window. The fields in the list map to the fields entered when
you configured the host.
Once you have finished adding computers to an computer group, you can
configure the properties for each computer group.
To update an existing computer
1
In the left pane, click
Firewall
.
2
In the right pane, on the Computers tab, under Host Identity, in the Select
Host drop-down list, select a host.
3
Make the changes to the computers fields.
4
Click
Update
.
The updated computer is displayed in the Host List.
To delete an existing computer
1
In the left pane, click
Firewall
.
2
In the right pane, on the Computers tab, under Host Identity, in the Select
Host drop-down list, select a host.
3
Click
Delete
.