Editing Common Packet Filter Policies; Set Access Control Options (Incoming) - Watchguard Firebox X15 User Manual

Firebox x edge e-series version 10 all firebox x edge e-series standard and wireless models
Hide thumbs Also See for Firebox X15:
Table of Contents

Advertisement

Editing common packet filter policies

You can edit some default settings of a common packet filter policy.
On the Incoming tab, you can define a service host, redirect the port, enable logging, or restrict the IP
addresses on the external network that can connect to a computer behind the Firebox X Edge e-Series. On the
Outgoing tab, you can enable logging and restrict the IP addresses on the trusted or optional networks that
can connect to the external network with this policy in the From field. You can also restrict the external IP
addresses to which trusted or optional computers can connect to in the To field.
To edit a common packet filter policy:
1. To connect to the System Status page, type
of the Firebox X Edge trusted interface.
The default URL is: https://192.168.111.1
2. From the navigation bar, select Firewall > Incoming or Firewall > Outgoing. You can edit both
incoming and outgoing traffic from either page.
The Filter Traffic page appears.
3. Find the common packet filter policy you want to edit and click Edit.

Set access control options (incoming)

1. From the Edit Policies page, select the Incoming tab.
The Incoming tab appears.
2. From the Incoming Filter drop-down list, select the rule you want to apply. This rule affects only
incoming traffic.
3. If the policy is set to Allow, enter the IP address of the computer that you want to receive the traffic in
the Policy Host field, or select 1-to-1 NATand select the IP address pair you want to associate with the
policy from the adjacent drop-down list. For more information on 1-to-1 NAT, see
4. To use port address translation, enter the new port number in the Port Redirect text box. With port
address translation, the destination port in the initial packet header is changed to a different
destination port as the packet goes through the Edge.
5. Select Host IP Address, Network IP Address, Host Range, or Alias from the drop-down list to specify
IP addresses or an alias for the external network that can use this policy. Type the IP address or range
of IP addresses you want to allow and click Add. You can enter more than one address.
Type network IP addresses in slash notation. For more information, see About slash notation.
6. To have the Firebox save log messages for this policy to the log file, select the Log incoming traffic
check box.
7. Click Submit.
User Guide
in the browser address bar, and the IP address
https://
Firewall Policies
Enable
1-to-1-NAT.
119

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents