

Service elements are used in Firewall Policies, IPS Service elements match traffic based on protocol or port and set options for advanced There are special considerations for using SMC elements in policies. Using SMC elements to represent IP addresses in policies.The criteria in an expression combine network elements (IP addresses) with logical

Network elements are different types of elements that represent IP addresses. Zone elements allow you to group network interfaces of Firewall, IPS, and Layer 2 Networks that can be used to filter traffic in Access rules, NAT rules, InspectionĪ Network element represents the IP address space of a complete network or subnetwork.Ī Router element represents a next-hop gateway’s IP address in routing configurations IP Address List elements contain large lists of IP addresses, IP address ranges, or The Group element can be used to combine any number of previously defined elementsĪ Host element represents the IP addresses of any single device. To represent complex sets of IP addresses. There are several types of elements in the SMC that represent IP addresses.Īn Address Range element can specify any continuous range of IP addresses.Īlias elements represent different IP addresses depending on the engine on whichĬountry elements are IP address lists based on country-level geolocation information.Ī Domain Name element represents all IP addresses that belong to a particular domain.Įxpression elements allow you to combine other network elements with logical operators When you define IP addresses as elements, you can use the same definitions in multiple NAT (network address translation) is applied on Firewalls, Master NGFW Engines, and Virtual Firewalls. You to control how the engines inspect and filter network traffic, and how The rules in Firewall, IPS, Layer 2 Firewall, and Layer 2 Interface Policies allow Through the Access rules and what happens when a certain type of pattern is found. Inspection Policy elements define how the engines look for patterns in traffic allowed They are your main configuration tool forĭefining which traffic is stopped and which traffic is allowed. Treats different types of network traffic. Template Policies, Policies, and Sub-Policies.Īccess rules are lists of matching criteria and actions that define how the engine The policy elements for the engines include Policy elements are containers for the rules that determine how NGFW Engines, Master NGFW Engines, and Virtual NGFW Engines examine traffic. Policies are key elements that contain rules for allowing or blocking network traffic Use the Management Client to configure static or dynamic routing, and use a Multi-LinkĬonfiguration to manage and distribute inbound and outbound connections. You can configure the NGFW Engine properties, activate optional features, and You can create and modify Firewalls, IPS engines, Layer 2 Firewalls, Master NGFW Engines and Virtual NGFW Engines. Security Management Center (SMC) configuration allows you to customize how the SMC components work. You can command and set options for engines through the Management Client or on theĮngine command line. You can use the SMC to monitor system components and third-party devices. How the different SMC components should be positioned and deployed.Īfter deploying the SMC components, you are ready to start using the Management Client and carrying out

This online Help was created for Forcepoint Next Generation Firewall (Forcepoint NGFW), version 6.7.0.
