Policy Definition Page - Extreme Networks EPICenter Software Installation Manual

Hide thumbs Also See for EPICenter:
Table of Contents

Advertisement

Using the Policy Manager
— For Access-based Security policies, "network resources to users" indicates traffic going from the
endpoints specified in Network Resources side of the Policy Traffic area of the Policy Description
page, to the endpoints specified in the Users area. "Users to network resources" indicates traffic
flowing from user endpoint(s) to the network resource endpoint(s). "Bidirectional" indicates that
access list rules are generated for traffic in both directions. The default for these policies is the
"users to network resources direction". The default choice gives a lower total number of ACLs
since bi-directional requires twice the number of rules as uni-directional.
— For IP policies, "server to client" indicates traffic going from the endpoints specified in Server
side of the Policy Traffic area of the Policy Description page, to the endpoints specified in the
Client area. "Client to server" indicates traffic flowing from client endpoint(s) to the server
endpoint(s). "Bidirectional" indicates that access list rules are generated for traffic in both
directions.
— For Source Port policies, the direction will always be "from source port."
— For VLAN policies, the direction will always be "from VLAN."
• Description displays the description, if any, that was entered when the policy was defined.
By default, the policy list is sorted by policy type. To sort based on the contents of a different column,
click the column header. Clicking a second time reverses the sorting sequence.
To view the specifications for an individual policy, you can do one of the following:
• Select the policy name in the component tree.
• Double-click anywhere within the policy entry in the policy list display.
This displays the Policy description page for the selected policy.

Policy Definition Page

The Policy Definition page displays the high-level definition of the selected policy, in terms of the
network elements (users, hosts, and L4 ports as appropriate) that define the traffic flow, and the devices
on which the policy is implemented.
Figure 201 shows the Policy Definition page for an Access-based Security policy.
412
EPICenter Software Installation and User Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Epicenter 4.1

Table of Contents