Overview
How to configure interfaces, security zones, DHCP, and security policies in Secure Firewall Device Manager so your Secure Firewall 1210/20 matches your network design and traffic requirements.
Configure additional interfaces, a DHCP server, and customize the security policy.
Procedure
| 1. | If you want to convert a switch port to a firewall interface, choose Device, and then click the link in the Interfaces summary. |
|
| 2. | If you configured new firewall interfaces, choose Objects, then select Security Zones. Edit or create new zones as appropriate and assign the interface to the zone. Each interface must belong to a zone for which you configure policies. The following example creates a new dmz_zone and then assigns the dmz interface to it.
|
|
| 3. | If you want internal clients to use DHCP to obtain an IP address from the device, choose , then select the DHCP Servers tab. There is already a DHCP server configured for the inside interface.
|
|
| 4. | Choose Policies and configure the security policies for the network. The device setup wizard enables traffic flow between the inside_zone and outside_zone using a Trust rule. A Trust rule does not apply an intrusion policy. To use intrusion, specify the Allow action for the rule. The policy also includes interface PAT for all interfaces when going to the outside interface.
However, if you have interfaces in different zones, you need access control rules to allow traffic to and from those zones. In addition, you can configure other policies to provide additional services and fine-tune NAT and access rules to get the results that your organization requires. You can configure the following policies by clicking the policy type in the toolbar:
The following example shows how to allow traffic between the inside_zone and dmz_zone in the access control policy. In this example, no options are set on any of the other tabs except for Logging, where At End of Connection is selected.
|
|
| 5. | Choose Device, then click View Configuration in the Updates group and configure the update schedules for the system databases. If you are using intrusion policies, set up regular updates for the Rules and VDB databases. If you use Security Intelligence feeds, set an update schedule for them. If you use geolocation in any security policies as matching criteria, set an update schedule for that database. |
|
| 6. | Click the Deploy button in the menu, then click the Deploy Now button ( Changes are not active on the device until you deploy them. |
) for the switch port.