Chapter 4. POLICY¶
Basic settings: Who, where from, and which path.
Advanced settings: Inspection of carried content.
Protection settings: Whether to provide protection.
4-1. Security Policy¶
Outgoing: Rules governing traffic from the internal network to the external network. When performing IP address translation, only Routing and NAT options are available. Routing is typically used between zones, while NAT is commonly employed for internet access.
Incoming: Rules governing traffic from the external network to the internal network. When performing IP address translation, options include IP mapping, port mapping, and server mapping, facilitating the redirection of packets into the internal network.
Advance: Advanced version of policies, not segregated by internal or external traffic, allowing administrators to determine packet ingress and egress rules. All rule options, including Routing, NAT, IP mapping, port mapping, and server mapping, are available for IP address translation.
SYN Protection: Provides protection against SYN attacks by ensuring that connections are genuine before passing them to backend servers. Due to the processing stage occurring before connection establishment, SYN Protection has the highest priority. When performing IP address translation, only IP mapping, port mapping, and server mapping options are available, primarily aimed at blocking abnormal connections from the external network to internal servers.
Tip
Video references: ShareTech NU Series Tutorial- Incoming and Outgoing Regulation Introduction and Examples
Image |
Name |
Description |
Bandwidth Management |
Bandwidth management functionality is enabled. |
|
Time Schedule |
Activate a schedule to automatically execute rules within a set time range. |
|
URL Control |
URL control functionality is enabled. |
|
Application Control |
Manage which applications, such as web, FTP, Skype, etc., are allowed. |
|
Virus Scan Control |
Web and FTP virus scanning. |
|
Authentication |
Requires login credentials to connect to the internet. |
|
IPS |
Intrusion Detection and Prevention. |
|
Logging Control |
Logging for HTTP and email. |
|
Bulletin Board |
Users must view the content of the bulletin board. |
|
Gateway |
Specification Select which gateway to use. |
|
Protection |
Enable firewall protection. |
|
Any Protocol |
Any protocol including TCP/UDP/ICMP, etc. |
|
TCP |
TCP communication protocol. |
|
UDP |
UDP communication protocol. |
|
ICMP |
ICMP communication protocol. |
|
Permit |
NAT operating mode, allowing packets that match the policies to pass through. |
|
Deny |
Deny packets that match the policies from passing through. |
|
Pause |
Pause the operation of the policies. |
|
Activate |
Activate the operation of the policies. |
|
Modify |
Modify the content of the policies. |
|
Delete |
Delete the policies. |
4-1-1. Outgoing¶
Outgoing Basic Settings¶
· Option Mode: The system automatically adds the following source IP addresses for selection:A. Internal ZONE defined in “Network > Network Interface”.B. Address tables or groups created in “Object > IP Address”.C. IP addresses assigned in various VPNs, including PPTP servers, SSL VPN, and L2TP assigned to remote users.· Define Mode: Administrators directly input source IP addresses or MAC addresses.
· Option Mode: The system automatically adds address tables or groups already created in “Object > Address Table” for selection.· Custom IP Address Mode: Administrators directly input destination IP addresses or MAC addresses.
Note
NG-UTM does not control different source and destination IP addresses within the same interface (ZONE). Its behavior is like that of a switch’s bridging function, where only network packets entering and exiting interfaces (ZONE) will apply policies.
note
note
note
Outgoing Basic Settings > Assign Gateway and Network Address Translation¶
Tip
Video Reference | Instruction on Outbound Load Balancing and Examples
Outgoing Advanced Settings¶
Tip
- DROP: Packets exceeding the quota will be discarded, and users’ web pages will display the text set in Web Block Message.- Continue to run next policy: Packets that exceeds the quota will proceed to the next rule for processing.
Outgoing Protection Settings¶
4-1-2. Incoming¶
Incoming Basic Settings¶
Option Mode: The system will automatically include the address tables or groups already established in “Management Target > Address Table” for administrators to choose from.
Define Mode: Administrators directly enter the source IP address or MAC address.
Option Mode: The system will automatically include the following types of source IP addresses for administrators to choose from.
A. Defined in “Network > Network Interfaces” internal ZONE.B. Established in “Object > IP Address” address tables or groups.
Custom IP Address Mode: Administrators directly enter the source IP address or MAC address.
note
note
note
Incoming Basic Settings > Network Address Translation¶
Note
For WEB-type servers, NG-UTM provides WAF protection mechanisms. For detailed settings, please refer to Chapter 9. WAF .
Advanced Settings¶
tip
note
Incoming Protection Settings¶
4-1-3. Advance¶
Note
The priority of Advance is higher than Outgoing and Incoming. If the same policy is set separately in Outgoing, Incoming, and Advance, Advance will take precedence.
4-1-4. SYN Protection¶
4-2. IPSec Policy¶
IPSec Policy > Basic Settings¶
· To IPSec: From inside through the IPSec VPN channel to the remote.· IPSec To: From the IPSec VPN channel into the inside.
· Option Mode: System lists the address tables or groups already created in “Management Target > Address Table”.· Define Mode: Enter the source IP address or MAC address directly.
· Option Mode: System lists the address tables or groups already created in “Management Target > Address Table”.· Define Mode: Enter the destination IP address directly.
note
IPSec Policy > Advanced Settings¶
4-3. SD-WAN Policy¶
SD-WAN Policy > Basic Setting¶
· To SD-WAN: Establishing a connection from the local end to the other end of the SD-WAN channel.· SD-WAN To: Establishing a connection from the SD-WAN channel to the local end.
Option Mode: Select an address table or group already established in “Object > Address Table”.Define Mode: Directly input the source IP address or MAC address.
· Option Mode: Select an address table or group already established in “Object > Address Table”.· Custom Mode: Administrators directly input the destination IP address.
note
SD-WAN Policy > Advanced Settings¶
4-4. Example of Policy Application¶
Example |
Network Interface |
Management Requirements |
---|---|---|
1 |
Wired Zone (Zone 1) |
Cannot access blacklisted URLs and record browsing websites. |
2 |
Wireless Zone (Zone 2) |
Must authenticate when accessing the Internet and view bulletin boards; Internet access is prohibited after work hours. |
3 |
Internal Server Zone (Zone 3) |
Prohibit Internet access; only specific internal IP addresses are allowed to enter. |
4 |
External Service Zone (Zone 4) |
Only web services are allowed in and out, and IPS and firewall protection are enabled. |
5 |
External Service Zone (Zone 4) |
Only mail services are allowed in and out, and spam and virus email filtering are enabled. |
Network Interface |
Quantity, Physical Port |
IPV4 Address |
Description |
---|---|---|---|
Wired Zone (Zone 1) |
2, Eth1, Eth2 |
192.168.2.0/24 |
Connected to L2 switch downstream |
Wireless Zone (Zone 2) |
1, Eth3 |
192.168.5.0/24 |
Connected to wireless AP |
Internal Server Zone (Zone 3) |
3, Eth4~Eth6 |
172.16.1.0/24 |
Mail and web servers, no need for external switch |
External Service Zone (Zone 4) |
5, Eth7~Eth11 |
172.16.5.0/24 |
ERP and Data servers, no need for external switch |
External Line (Zone 5) |
2, Eth12, Eth13 |
61.22.23.24/32 |
Only one external line connected |
4-4-1. Example: Internet Access Control¶
Wired Zone (Zone 1) cannot access blacklisted URLs and record browsing websites.
4-4-2. Example: Control IP Access¶
Internal Server Zone (Zone3) prohibits Internet access and only specific internal IP addresses are allowed to enter.
4-4-3. Example: Web Server¶
The External Service Zone (Zone 4) only allows Web services to enter and exit, and IPS and firewall protections are enabled.