Create/Edit Security Policy

Overview

Key Sections

Name

This field allows you to give the policy a name that helps you identify the access pattern, for example

  • Allow Access from Company Network

  • Deny Access from Country XYZ

  • Allow E-Mail Protocols

  • Allow RPC traffic

Allow/Deny

This section allows you to define rules that allow and deny network access based on the specified protocol, IP address range, and port range of the traffic origin.

  • Protocol: TCP, UDP. Leave empty for any protocol.

  • Source: An IP address or CIDR block of the traffic origin. Leave empty for any host.

  • Port range: A single port number or a colon separated port range (START_PORT:END_PORT). Only valid port numbers 1-65535 are accepted. Leave empty for any port number.

Add new rules by clicking the green plus sign (+) on the right hand side. You can remove individual rules from the policy by clicking the red minus sign (-) next to the rule row.

Servers to apply this policy

This section specifies to what servers in your cluster this rule is supposed to be applied. All servers are selected by default, but you can choose to exclude specific servers from this policy.

Applying policies to servers

To apply the policies uniformly to the firewall configuration on the servers, navigate to the Server Security tab.

Last updated