The access settings control whether the service is allowed or denied, and also the order rules are applied to the firewall.
Note: Each of the three firewall ports must be configured separately. |
The access rules for configuring firewalls are described in the following:
A DNS entry will be created for that IP address
Rules are applied to the firewall from top to bottom (each row of is a rule)
The + (plus) and - (minus) symbols add and/or subtract a new rule to the configuration
There must be at least one rule defined per interface and there is no maximum
Only one DMZ per firewall is permitted
The trusted interface must be set up before the infrastructure is submitted
See Also