Options include: Accept, Drop, Ask, Inform ( UserCheck message), Inline Layer Set of rules used in another rule in Security Policy., and Reject. You can set the direction of the data to Download Traffic (into the organization), Upload Traffic (out of the organization), or Any Direction.Īction that is done when traffic matches the rule. The data asset to protect, for example, credit card numbers or medical records. If Application & URL Filtering Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Services, Applications, Categories, and Sites. The VPN Community to which the rule applies. Name that the system administrator gives this rule. Number of times that connections match a rule. Rule Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. To select a column that does not show, right-click on the header of the Rule Base All rules configured in a given Security Policy. These are the columns of the rules in the Access Control policy. The Columns of the Access Control Rule Base The Columns of the Access Control Rule Base
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |