Access Control Lists - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION Administration Manual

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION:
Table of Contents

Advertisement

6.3.9 Access Control Lists

There may be some addresses which require unsolicited traffic be passed regardless of the current
port behavior (i.e., enterprise back-up server, exchange server, etc.). In instances where unsolicited
traffic needs to be passed to and from trusted servers, an Access Control List (ACL) can be created
to resolve this issue.
NOTE: This feature is only available in the ZENworks Endpoint Security Management installation,
and cannot be used for UWS security policies.
To access this control, open the Locations tab, click the "+" symbol next to Firewall Settings, click
the "+" symbol next to the desired Firewall, and click the Access Control Lists icon in the policy
tree on the left.
Figure 6-44
To create a new ACL setting:
1 Select Access Control List from the components tree and click the Add New button
2 Name the ACL and provide a description
3 Enter the ACL address or Macro
4 Enter the ACL type:
IP - This type limits the address to 15 characters, and only containing the numbers 0-9 and
periods (example: 123.45.6.189). IP addresses may also be entered as a range (example:
123.0.0.0 - 123.0.0.255)
134 ZENworks Endpoint Security Management Administration Guide
Access Control Lists Settings

Advertisement

Table of Contents
loading

Table of Contents