Define the Initial Internet-to-Data-Center Traffic Security Policy
Define the external application traffic from vendors,
customers, partners, etc., that can access your data center from
As with the other data center traffic flows, tightly
control traffic flowing from the internet to the data center with
application allow security policy rules so that no traffic using
unknown or unsanctioned applications can enter the data center.
In addition, protect the data center web servers from denial-of-service
(DoS) attacks by applying
DoS Protection policy rules (with
DoS Protection profiles) to external traffic destined
for the data center web server tier.