ZyXEL UAG4100 User Guide - Page 299
Security Policy Configuration Example
View all ZyXEL UAG4100 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 299 highlights
Chapter 25 Security Policy Table 133 Configuration > Security Policy > Session Control > Add/Edit (continued) LABEL User DESCRIPTION Select a user name or user group to which to apply the rule. The rule is activated only when the specified user logs into the system and the rule will be disabled when the user logs out. Otherwise, select any and there is no need for user logging. Address Session Limit per Host Note: If you specified an IP address (or address group) instead of any in the field below, the user's IP address should be within the IP address range. Select the IPv4 source address or address group to which this rule applies. Select any to apply the rule to all IPv4 source addresses. Use this field to set a limit to the number of concurrent NAT/security policy sessions this rule's users or addresses can have. OK Cancel For this rule's users and addresses, this setting overrides the Default Session per Host setting in the general Security Policy > Session Control screen. Click OK to save your customized settings and exit this screen. Click Cancel to exit this screen without saving. 25.4 Security Policy Configuration Example The following Internet security policy example allows Doom players from the WAN to IP addresses 172.16.1.10 through 172.16.1.15 (Dest_1) on the LAN. 1 Click Configuration > Security Policy > Policy Control. In the summary of security policies click Add to configure a new first entry. The sequence (priority) of the policies is important since they are applied in order. Figure 211 Security Policy Example: Security Policy Control Screen 2 At the top of the screen, click Create new Object > Address to configure an address object. Configure it as follows and click OK. UAG Series User's Guide 299