Network and System Management
407
ProSecure Unified Threat Management (UTM) Appliance
When you define outbound firewall rules, you can further refine their application according to
the following criteria:
• Services. You can specify the services or applications, or groups of services or
applications to be covered by an outbound rule. If the desired service or application does
not display in the list, you need to define it using the Services screen (see Service-Based
Rules on page 122 and Add Customized Services on page 154).
• LAN users. You can specify which computers on your network are affected by an
outbound rule. There are several options:
- Any. The rule applies to all PCs and devices on your LAN.
- Single address. The rule applies to the address of a particular PC.
- Address range. The rule applies to a range of addresses.
- Groups. The rule applies to a group of PCs. (You can configure groups for LAN WAN
outbound rules but not for DMZ WAN outbound rules.) The Known PCs and Devices
table is an automatically maintained list of all known PCs and network devices and is
generally referred to as the network database, which is described in Manage the
Network Database on page 106. PCs and network devices are entered into the
network database by various methods, which are described in Manage Groups and
Hosts (LAN Groups) on page 105.
- IP Groups. The rule applies to a group of individual LAN IP addresses. Use the IP
Groups screen (under the Network Security main navigation menu) to assign IP
addresses to groups. For more information, see Create IP Groups on page 158.
• WAN users. You can specify which Internet locations are covered by an outbound rule,
based on their IP address:
- Any. The rule applies to all Internet IP address.
- Single address. The rule applies to a single Internet IP address.
- Address range. The rule applies to a range of Internet IP addresses.
- IP Groups. The rule applies to a group of individual WAN IP addresses. Use the IP
Groups screen (under the Network Security main navigation menu) to assign IP
addresses to groups. For more information, see Create IP Groups on page 158.
• Schedule. You can configure three different schedules to specify when a rule is applied.
Once a schedule is configured, it affects all rules that use this schedule. You specify the
days of the week and time of day for each schedule. For more information, see Set a
Schedule to Block or Allow Specific Traffic on page 168.
• QoS profile. You can define QoS profiles and then apply them to outbound rules to
regulate the priority of traffic. For information about how to define QoS profiles, see
Create Quality of Service Profiles on page 160.
• Bandwidth profile. You can define bandwidth profiles and then apply them to outbound
rules to limit traffic. For information about how to define bandwidth profiles, see Create
Bandwidth Profiles on
page 162.