In this video, you'll learn how to create an order multiple. I pee before policies in the policy table.
In this example, three policies will be configured Policy A allows Internet access to the local area. Network
policy be allows Internet access to mobile devices while applying additional security features and policy see allows the system administrators PC to have full access.
In this example, Ah, wireless network has already been configured that is on the same sub net as the wired land
configure policy. A. By going to policy and objects policy, I pee before and editing the default policy, allowing outgoing traffic
set service to a seedy P h, g, d, p s and D M s to restrict access to Internet browsing.
And sure that you've enabled that
in order to view the results later, enable log allowed traffic and select all sessions.
set incoming interface, outgoing interface and service to be identical to policy. A allowing land to Internet traffic
set source of ice type to mobile devices, a default device group that includes tablets and mobile phones.
Please note that using a device group will automatically enabled device identification on the land interviewees
under security Profile's enable Web filter and set it to use the default profile during this will also enable proxy options and SSL inspection. Use the default profile for proxy and set SSL inspection to certificate inspection, which will allow https traffic to be inspected, enabled log allowed traffic
and select all sessions.
Go to use during device device device definitions To create a definition for the system. Administrators PC
Set the MAC address of the PC and choose the appropriate device type.
Go to policy and objects palsy. I pee before and create policy, See
said. Incoming interface to land
source device Tired to system in PC
outgoing interface. Your Internet facing interface and service to all
enable both Matt and Log allowed traffic selecting all sessions
view the policy table. Currently, the policies are arranged in the order they were created to ensure that the correct traffic is flowing through each policy. They must be re arranged so that the more specific policies are located at the top of the list.
To reorder the policies, select any area in the far left column for policy, Be and drag the Paul's you to the top of the list.
Repeat this for policy. See so that the order is now policy. See policy. Be policy A with the default Deny policy at the bottom.
Browse the Internet using the system administrators PC, a different PC located on land and a mobile device to generate traffic. Then goto log and report traffic. Lug forward traffic.
You can see the traffic from the three devices flows through different policies.
Thank you for watching.
For further details, please go to Dock Stat ford net dot com to access port nets. Complete documentation library.