Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Add a Resource Profile

You are here: Device Administration > Multi Tenancy > Resource Profiles.

To add a resource profile:

  1. Click the add icon (+) on the upper right side of the Resource Profile page.

    The Add Resource Profile page appears.

  2. Complete the configuration according to the guidelines provided in Table 1.
  3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Table 1: Fields on the Add Resource Profile Page

Field

Description

General

Profile Name

Enter a name of the security profile.

The string must contain an alphanumeric character and can include underscores; no spaces allowed; 31 characters maximum.

IPS Policy

Select the IPS policy from the list.

Resource Allocation

nat-pat-portnum

Specify the maximum quantity and the reserved quantity of ports for the logical system as part of its security profile.

dslite-softwire-initiator

Specify the number of IPv6 dual-stack lite (DS-Lite) softwire initiators that can connect to the softwire concentrator configured in either a user logical system or the primary logical system.

cpu

Specify the percentage of CPU utilization that is always available to a logical system.

appfw-rule

Specify the number of application firewall rule configurations that a primary administrator can configure for a primary logical system or user logical system when the security profile is bound to the logical systems.

nat-interface-port-ol

Specify the number of application firewall rule set configurations that a primary administrator can configure for a primary logical system or user logical system when the security profile is bound to the logical systems.

nat-rule-referenced-prefix

Specify the security NAT interface port overloading the quota of a logical system.

nat-port-ol-ipnumber

Specify the number of NAT port overloading IP number configurations that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

nat-cone-binding

Specify the number of NAT cone binding configurations that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

nat-static-rule

Specify the number of NAT static rule configurations that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

nat-destination-rule

Specify the number of NAT destination rule configurations that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

nat-source-rule

Specify the NAT source rule configurations that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

nat-nopat-address

Specify the number of NAT without port address translation configurations that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

nat-pat-address

Specify the number of NAT with port address translation (PAT) configurations that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

nat-destination-pool

Specify the number of NAT destination pool configurations that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

nat-source-pool

Specify the NAT source pool configurations that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

flow-gate

Specify the number of flow gates, also known as pinholes that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

flow-session

Specify the number of flow sessions that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

policy

Specify the number of security policies with a count that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

security-log-stream-number

Specify the security log stream number.

scheduler

Specify the number of schedulers that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

zone

Specify the zones that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

auth-entry

Specify the number of firewall authentication entries that user logical system administrators and primary logical system administrators can configure for their logical systems if the security profile is bound to the logical systems.

address-book

Specify the application firewall profile quota of a logical system.

Reserved

A reserved quota that guarantees that the resource amount specified is always available to the logical system.

Maximum

A maximum allowed quota.

Range

The minimum and maximum range permitted for each corresponding resource name.