TMS zl Management and Configuration Guide ST.1.1.100430
4-40
Firewall
Firewall Access Policies
If you delete Internal-to-DMZ policy 2, the connection is dropped and then
reevaluated against all of the Internal-to-DMZ policies. Figure 4-21 shows that
the connection is now permitted by Internal-to-DMZ policy 2,which used to
be policy 3.
Figure 4-21. Example Firewall Access Policy Process for Deleting Policies
Policy Examples
Three examples will be provided below:
■ A unicast access policy
■ A scheduled access policy
■ A rate-limiting access policy
Unicast Access Policy
In this example, a policy that permits all users from the Internet to access only
secure Web traffic inside the DMZ will be created. This policy will use an
address object.