Dell W-Series 277 Instant 6.5.1.0-4.3.1.0 User Guide - Page 269

Table 58, Domain Name

Page 269 highlights

Table 58: Access Rule Configuration Parameters Service Category Description 1. Select the Application Throttling check box. 2. Specify the downstream and upstream rates in Kbps. Action Select any of following actions: l Select Allow to allow access to users based on the access rule. l Select Deny to deny access to users based on the access rule. l Select Destination-NAT to allow changes to destination IP address. l Select Source-NAT to allow changes to the source IP address. The destination-NAT and source-NAT actions apply only to the network services rules. Destination Select a destination option for the access rules for network services, applications, and application categories. You can allow or deny access to any the following destinations based on your requirements. l to all destinations-Access is allowed or denied to all destinations. l to a particular server-Access is allowed or denied to a particular server. After selecting this option, specify the IP address of the destination server. l except to a particular server-Access is allowed or denied to servers other than the specified server. After selecting this option, specify the IP address of the destination server. l to a network-Access is allowed or denied to a network. After selecting this option, specify the IP address and netmask for the destination network. l except to a network-Access is allowed or denied to networks other than the specified network. After selecting this option, specify the IP address and netmask of the destination network. l to domain name-Access is allowed or denied to the specified domains. After selecting this option, specify the domain name in the Domain Name text box. l to master IP-Access is allowed or denied to the master IP address. Log Select this check box to create a log entry when this rule is triggered. Instant supports firewall-based logging function. Firewall logs on the W-IAPs are generated as security logs. Blacklist Select the Blacklist check box to blacklist the client when this rule is triggered. The blacklisting lasts for the duration specified in Auth failure blacklist time on the Blacklisting tab of the Security window. For more information, see Blacklisting Clients on page 172. Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide Deep Packet Inspection and Application Visibility | 269

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435

Service
Category
Description
1.
Select the
Application Throttling
check box.
2.
Specify the downstream and upstream rates in Kbps.
Action
Select any of following actions:
l
Select
Allow
to allow access to users based on the access rule.
l
Select
Deny
to deny access to users based on the access rule.
l
Select
Destination-NAT
to allow changes to destination IP address.
l
Select
Source-NAT
to allow changes to the source IP address.
The destination-NAT and source-NAT actions apply only to the network services rules.
Destination
Select a destination option for the access rules for network services, applications, and
application categories. You can allow or deny access to any the following destinations
based on your requirements.
l
to all destinations
—Access is allowed or denied to all destinations.
l
to a particular server
—Access is allowed or denied to a particular server. After
selecting this option, specify the IP address of the destination server.
l
except to a particular server
—Access is allowed or denied to servers other than the
specified server. After selecting this option, specify the IP address of the destination
server.
l
to a network
—Access is allowed or denied to a network. After selecting this option,
specify the IP address and netmask for the destination network.
l
except to a network
—Access is allowed or denied to networks other than the
specified network. After selecting this option, specify the IP address and netmask of the
destination network.
l
to domain name
—Access is allowed or denied to the specified domains. After
selecting this option, specify the domain name in the
Domain Name
text box.
l
to master IP
—Access is allowed or denied to the master IP address.
Log
Select this check box to create a log entry when this rule is triggered. Instant supports
firewall-based logging function. Firewall logs on the W-IAPs are generated as security logs.
Blacklist
Select the
Blacklist
check box to blacklist the client when this rule is triggered. The
blacklisting lasts for the duration specified in
Auth failure blacklist time
on the
Blacklisting tab of the
Security
window. For more information, see
Blacklisting Clients on
page 172
.
Table 58:
Access Rule Configuration Parameters
Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide
Deep Packet Inspection and Application Visibility |
269