TMS zl Management and Configuration Guide ST.1.0.090213
4-23
Firewall
Firewall Access Policies
iii. From the Protocol list, select a protocol.
If you selected TCP or UDP in step 4, in the Port(s) fields, type the
port number range, or if there is only one port number, type it in
the first field. When creating a service object for a well-known
service on an alternative port, you may also need to add the port-
to-service association. See “Port Mapping” on page 4-71.
b. From the Source and Destination fields, select an address object. To
specify an address that is not on the list:
i. Click Options.
ii. Select Enter custom IP, IP/mask or Range.
iii. Type the IP address or IP address range in the space provided.
Use CIDR format to specify the address of a network.
5. Optionally, in the Source Ports fields, type the port number range, or if
there is only one port number, type it in the first field.
6. Select the Enable this Policy check box to enable the access policy.
7. Select the Enable IPS for this Policy check box to enable IPS to check
packets on this policy.
8. Select the Enable logging on this Policy check box to log access policy
activities.
Note It is not recommended that you enable logging permanently, because
policy logging is processor-intensive. Use logging for troubleshooting and
testing only.
9. Optionally, in the Insert Position field, specify the priority of this access
policy.
10. Click Apply, then optionally click the Advanced tab.
Advanced Tab
All of the settings on the Advanced tab are optional.