Define the Initial Internet-to-Data-Center Traffic Security Policy

Define the external application traffic from vendors, customers, partners, etc., that can access your data center from the internet.
As with the other data center traffic flows, tightly control traffic flowing from the internet to the data center with application allow security policy rules so that no traffic using unknown or unsanctioned applications can enter the data center. In addition, protect the data center web servers from denial-of-service (DoS) attacks by applying DoS Protection policy rules (with DoS Protection profiles) to external traffic destined for the data center web server tier.

Recommended For You