Using firewall rule records
108402_en_00 PHOENIX CONTACT 1
1 Using firewall rule records
Contents of this document
The use of firewall rule records is described in this document. This simplifies and
accelerates the creation of firewall rules.
1.1 Introduction........................................................................................................... 1
1.2 Example 1 ("Server" rule record) .......................................................................... 3
1.3 Example 2 ("Service" rule record) ......................................................................... 4
1.1 Introduction
Individual firewall rules can be summarized in rule records. These rule records can then be
selected in firewall rules as actions and therefore put into use.
1.1.1 Example
External access to three particular servers in the internal network via the network services
ftp, telnet and https is to be allowed. Access to all other services and network addresses
from the external network (WAN) is to be prohibited.
Figure 1-1 Allow access to special services on certain servers
Problem
Without rule records, nine firewall rules must be created in a firewall table: three server IP
addresses for each of the three services.
Solution
With the help of rule records, certain sub-rules, i.e. the server IP addresses or the network
services, can be summarized in rule records. These can then be selected as actions in
firewall tables.
Document ID: 108402_en_00
Document designation: AH EN MGUARD FIREWALL RULESETS 1
© PHOENIX CONTACT 2018-10-16
Make sure you always use the latest documentation.
This is available to download at phoenixcontact.net/products
.