Outgoing Settings; Configuring Custom Packet Filter Policies - Watchguard Firebox X20E User Manual

Firmware version 8.6 all firebox x edge e-series standard and wireless models
Hide thumbs Also See for Firebox X20E:
Table of Contents

Advertisement

Configuring Custom Packet Filter Policies

Click Submit.
7

Outgoing settings

From the Edit Policies page, select the Outgoing tab.
1
From the Outgoing Filter drop-down list, select the rule you want to apply. This rule affects only
2
outgoing traffic.
To specify which computers on your trusted and optional network can use this policy, in the
3
From field, select Any and click Remove. Select Host IP Address, Network IP Address, Host
Range, or Alias from the drop-down list. Then enter the IP address or range of IP addresses you
want to allow and click Add. You can add more than one address. If you select Alias, you can
choose from Trusted Network, Optional Network, or Wireless Guest Network.
Type network IP addresses in "slash" notation.
To limit which computers on the external network can connect to computers on the trusted or
4
optional networks with this policy, in the To field, select Any and click Remove. Select Host IP
Address, Network IP Address, or Host Range from the drop-down list. Then enter the IP
address or range of IP addresses you want to allow and click Add. You can add more than one
address.
To have the Firebox save log messages for this policy to the log file, select the Log outgoing
5
traffic check box.
Click Submit.
6
Configuring Custom Packet Filter Policies
A custom packet filter policy for traffic is necessary if:
You must allow traffic for a policy that is not on the common packet filter policy list.
96
Firebox X Edge e-Series

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents