Here are examples of possible policy rules for authenticated users. The following table disallows some specific access before allowing everything else.
In | Out | Allow | IP / Port | Description |
---|---|---|---|---|
x | x | *.*.*.*:22-23 | SSH sessions | |
x | x | 192.168.18.0/24 | Deny all traffic to a specific IP address or address range | |
x | x | x | *.*.*.*. | Default action is to allow everything else |
The following table allows some specific access and denies everything else.
In | Out | Allow | IP / Port | Description |
---|---|---|---|---|
x | x | x | 192.168.18.0/24 | Allow traffic to a specific IP address or address range. |
x | x | *.*.*.*. | Default action is to deny all. |