Symantec 360R Administration Guide - Page 78

Configuring an exposed host, Firewall, Enable, Exposed Host

Page 78 highlights

78 Network traffic control Configuring advanced options ■ Other Redcreek Ravlin ■ None Note: Only change the IPsec pass-thru setting if required to do so by Symantec Technical Support. To configure IPsec pass-thru settings See "Advanced tab field descriptions" on page 186. 1 In the SGMI, in the left pane, click Firewall. 2 On the Advanced tab, under IPsec Passthru Settings, 3 Click Save. Configuring an exposed host Exposed Host opens all ports so that one computer on a LAN has unrestricted two-way communication with Internet servers or users. This is useful for hosting games or special server applications. All traffic that is not specifically allowed by inbound rules is directed to the exposed host. Warning: Because of the security risk, only activate Exposed Host only when required to do so. To configure an exposed host See "Advanced tab field descriptions" on page 186. 1 In the left pane, click Firewall. 2 In the right pane, on the Advanced tab, under Exposed Host, check Enable Exposed Host. 3 In the LAN IP Address text boxes, type the IP address of the host you want to expose. 4 Click Save.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

78
Network traffic control
Configuring advanced options
Other
Redcreek Ravlin
None
Note:
Only change the IPsec pass-thru setting if required to do so by Symantec
Technical Support.
To configure IPsec pass-thru settings
See
“Advanced tab field descriptions”
on page 186.
1
In the SGMI, in the left pane, click
Firewall
.
2
On the Advanced tab, under IPsec Passthru Settings,
3
Click
Save
.
Configuring an exposed host
Exposed Host opens all ports so that one computer on a LAN has unrestricted
two-way communication with Internet servers or users. This is useful for
hosting games or special server applications.
All traffic that is not specifically allowed by inbound rules is directed to the
exposed host.
Warning:
Because of the security risk, only activate Exposed Host only when
required to do so.
To configure an exposed host
See
“Advanced tab field descriptions”
on page 186.
1
In the left pane, click
Firewall
.
2
In the right pane, on the Advanced tab,
under Exposed Host, check
Enable
Exposed Host
.
3
In the LAN IP Address text boxes, type the IP address of the host you want to
expose.
4
Click
Save
.