Cisco ESW-540-48 Administration Guide - Page 109

Firewall Configuration, Appendix B, Standard Services, Creating, Custom Services,

Page 109 highlights

Firewall Configuration Configuring Firewall Rules to Control Inbound and Outbound Traffic 4 - If the From Zone is the LAN, then the To Zone can be the public DMZ or insecure WAN. • Service: Choose from a list of common services or a custom defined service. For more information, see Appendix B, "Standard Services" and Creating Custom Services, page 104. • Action: Choose how and when to apply the rule. • Select Schedule: If you choose one of the "by schedule" actions, choose a schedule from the list. For more information about schedules, see Creating Schedules for a Firewall Rules, page 105. • Source Hosts: You can apply the rule to all users or you can specify users by entering an IP address or address range. - If you choose Single Address, enter an IP address in the From field. - If you choose Address Range, enter the first address in the From field and enter the last address in the To field. • Destination Hosts: You can apply the rule to all users or you can specify users by entering an IP address or address range. - If you choose Single Address, enter an IP address in the From field. - If you choose Address Range, enter the first address in the From field and enter the last address in the To field. • Log: You can choose whether or not to log the packets for this rule. Click Never if you do not want to log the packets, or click Always to log the packets. • QoS Priority: You can use this rule to prioritize traffic. Each priority level corresponds to a Term of Service (ToS) value. - Normal-Service: ToS=0 (lowest QoS) - Minimize-Cost: ToS=1 - Maximize-Reliability: ToS=2 - Maximize-Throughput: ToS=4 - Minimize-Delay: ToS=8 (highest QoS) Cisco SA500 Series Security Appliances Administration Guide 109

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Firewall Configuration
Configuring Firewall Rules to Control Inbound and Outbound Traffic
Cisco SA500 Series Security Appliances Administration Guide
109
4
-
If the From Zone is the LAN, then the To Zone can be the public DMZ or
insecure WAN.
Service
: Choose from a list of common services or a custom defined service.
For more information, see
Appendix B, “Standard Services”
and
Creating
Custom Services, page104
.
Action:
Choose how and when to apply the rule.
Select Schedule:
If you choose one of the “by schedule” actions, choose a
schedule from the list.
For more information about schedules, see
Creating Schedules for a
Firewall Rules, page 105
.
Source Hosts
: You can apply the rule to all users or you can specify users
by entering an IP address or address range.
-
If you choose Single Address, enter an IP address in the
From
field.
-
If you choose Address Range, enter the first address in the
From
field and
enter the last address in the
To
field.
Destination Hosts
: You can apply the rule to all users or you can specify
users by entering an IP address or address range.
-
If you choose Single Address, enter an IP address in the
From
field.
-
If you choose Address Range, enter the first address in the
From
field and
enter the last address in the
To
field.
Log:
You can choose whether or not to log the packets for this rule. Click
Never
if you do not want to log the packets, or click
Always
to log the
packets.
QoS Priority:
You can use this rule to prioritize traffic. Each priority level
corresponds to a Term of Service (ToS) value.
-
Normal-Service:
ToS=0 (lowest QoS)
-
Minimize-Cost:
ToS=1
-
Maximize-Reliability:
ToS=2
-
Maximize-Throughput:
ToS=4
-
Minimize-Delay:
ToS=8 (highest QoS)