156
Chapter 12
Policy
Every packet has to be detected if it corresponds with Policy or not when it
passes the RS-1200. When the conditions correspond with certain policy, it
will pass the RS-1200 by the setting of Policy without being detected by
other policy. But if the packet cannot correspond with any Policy, the
packet will be intercepted.
The parameter of the policy includes Source Address, Destination Address,
Service, Action, WAN Port, Traffic Log, Statistics, Content Blocking,
Anti-Virus, Authentication User, Schedule, Alarm Threshold, Trunk, Max.
Concurrent Sessions, and QoS. Control policies decide whether packets
from different network objects, network services, and applications are able
to pass through the RS-1200.
How to use Policy?
The device uses policies to filter packets. The policy settings are: source address,
destination address, services, permission, packet log, packet statistics, and flow alarm.
Based on its source addresses, a packet can be categorized into:
(1)
Outgoing:
The source IP is in LAN network; the destination is in WAN network.
The system manager can set all the policy rules of Outgoing packets in this
function
(2)
Incoming:
The source IP is in WAN network; the destination is in LAN network.
(For example: Mapped IP, Virtual Server) The system manager can set all the
policy rules of Incoming packets in this function
(3)
WAN to DMZ:
The source IP is in WAN network; the destination is in DMZ
network. (For example: Mapped IP, Virtual Server) The system manager can
set all the policy rules of WAN to DMZ packets in this function
Summary of Contents for RS-1200
Page 1: ...RS 1200 User s Manual Dual WAN Security Gateway ...
Page 47: ...47 Figure3 7 Dynamic IP Address Connection Figure3 8 Complete Dynamic IP Connection Setting ...
Page 76: ...76 Figure7 2 the Flow After Using QoS Max Bandwidth 400Kbps Guaranteed Bandwidth 200Kbps ...
Page 113: ...113 Figure10 8 Virtual Server Configuration WebUI ...
Page 187: ...187 Figure13 4 NetBIOS Alert Notification to Administrator s PC ...
Page 188: ...188 Figure13 5 E mail Virus Alert ...
Page 214: ...214 Figure16 2 Outbound Destination IP Statistics Report ...
Page 218: ...218 Figure16 5 Inbound Top Users Statistics Report ...
Page 220: ...220 Figure16 6 Inbound Destination IP Statistics Report ...
Page 231: ...231 Figure18 1 Interface Status ...