Each policy type has a default definition, which consists of settings that are appropriate for most organizations. However, you can modify policy settings for your particular business purposes, or add other settings such as traffic management and operating schedules.
Mobile VPN policies are created and operate in the same way as firewall policies. You must, however, specify a Mobile VPN group for the policy.
When you add a new policy to your configuration, the Firewall Polices / Add Firewall Policy page automatically appears after you select the policy type and click Add Policy. To set properties for an existing policy, on the Firewall Policies page, double-click the policy to open the Firewall Polices / Edit page.
On the Settings tab, you can set basic information about a policy, such as whether it allows or denies traffic, create access rules for a policy, or configure policy-based routing, static NAT, or server load balancing. The Settings tab also shows the port and protocol for the policy, as well as an optional description of the policy. You can use the settings on this tab to set logging, notification, automatic blocking, and timeout preferences.
On the Application Control tab, you can select the Application Control action for the policy. You can also create a new Application Control action. For more information about Application Control actions in policies, see Enable Application Control in a Policy.
On the Traffic Management tab, you can select the Traffic Management action for the policy. You can also create a new Traffic Management action. For more information about Traffic Management actions, see Define a Traffic Management Action in v11.8.x and Lower and Add a Traffic Management Action to a Policy.
To apply a Traffic Management action in a policy:
On the Scheduling tab, you can specify an operating schedule for the policy. You can select an existing schedule or create a new schedule.
The Advanced tab includes settings for NAT, QoS, multi-WAN, Connection Rate, and ICMP options.
For more information on the options for this tab, see:
Proxy policies have predefined rulesets that provide a good balance of security and accessibility for most installations. If a default ruleset does not meet all of your business needs, you can add, delete, or modify rules.
Each proxy policy has connection-specific settings that you can customize. To modify the settings and rulesets for a proxy action from the proxy configuration, select the Proxy Action tab, and configure the settings for the proxy action.
For more information, see About Rules and Rulesets and the About topic for the specific proxy type.
|About the DNS-Proxy||About the POP3-Proxy|
|About the FTP-Proxy||About the SIP-ALG|
|About the H.323-ALG||About the SMTP-Proxy|
|About the HTTP-Proxy||About the TCP-UDP-Proxy|
|About the HTTPS-Proxy|
About Proxy Actions