You can use J-Web Quick Configuration to quickly configure security policies.
To configure security policies in the J-Web user interface:
Table 139: Policy Configuration Options
Field |
Description |
---|---|
Policy Name |
Specify a name for the security policy. |
From Zone |
Specify the source zone for the policy. (You must create the zones that you want to include in the policy before creating the policy.) |
To Zone |
Specify the destination zone for the policy. (You must create the zones that you want to include in the policy before creating the policy.) |
Source Address |
Specify the name of the source address or address set for the policy (as entered in the source zone’s address book) and move it to the Matched list using the arrows. If you want to add a new address to the list, select Add New Source Address. In the fields that appear, specify the new address and click Add.
Note: Address names cannot begin with the following reserved prefixes. These prefixes are used only for address NAT configuration:
|
Destination Address |
Specify the name of the destination address or address set for the policy (as entered in the source zone’s address book) and move it to the Matched list using the arrows. If you want to add a new address to the list, select Add New Destination Address. In the fields that appear, specify the new address and click Add.
Note: Address names cannot begin with the following reserved prefixes. These prefixes are used only for address NAT configuration:
|
Applications |
Specify the name of an application or application set to which the policy applies and move it to the Matched list using the arrows. If you do not want to specify an application, select any as the default application. |
Policy Action |
Specify the actions that need to take place on the traffic as it passes through the firewall:
|
Table 140: Logging/Count Configuration Options
Field |
Description |
---|---|
Enable Count | |
Enable Count |
Select this option to enable counting. If counting is enabled, counters are collected for the number of packets, bytes, and sessions that enter the firewall for a given policy. For counts (only for packets and bytes), you can specify that alarms be generated whenever the traffic exceeds specified thresholds.
Note: The alarm threshold fields are disabled if Enable Count is not selected. |
Per Minute Alarm Threshold |
Specify threshold bytes for the per-minute alarm threshold. Enter any value from 0 through 4294967295 kilobytes. |
Per Second Alarm Threshold |
Specify threshold bytes for the per-second alarm threshold. Enter any value from 0 through 4294967295 kilobytes. |
Log Options | |
Log at Session Close Time |
Select this option if you want to log the events when the session closed. |
Log at Session Init Time |
Select this option if you want to log the events when the session is created. |
Table 141: Permit Action Configuration Options
Field | Description |
---|---|
Tunnel — IPSec VPN | |
VPN |
Specify the name of the IPsec-VPN tunnel. |
Pair Policy | |
Pair Policy Name |
Specify the name of the policy with the same IPsec-VPN in the reverse direction to create a pair policy. |
NAT Translation | |
Options |
Select one of the following options:
|
Firewall Authentication |
Use these options to authenticate the client before forwarding the traffic. The two types of firewall authentication are:
|
Pass-through |
Use pass-through authentication verifies traffic as it attempts to pass through the firewall. |
Access Profile |
Select the access profile for the pass-through from the drop-down list. |
Client name |
Specify the client name for the pass-through. |
Web Redirect |
Select the Web Redirect option if you want to redirect the pass-through traffic for Web authentication. |
Web authentication |
Use Web authentication to verify client authentication. |
Client name |
Specify the client name for the Web authentication. |
Table 142: Application Services Configuration Options
Field |
Description |
---|---|
IDP | |
Enable IDP |
Select this option to enable IDP for the policy. |
UTM Policy | |
UTM Policy |
Select the required UTM policy from the drop-down list. |
Redirect | |
Options |
Select one of the following options:
|