End-of-Life (EoL)

Define the Initial Internet-to-Data-Center Traffic Security Policy

Define who can access applications and devices in your data center from the internet.
As with the other data center traffic flows, tightly control traffic flowing from the internet to the data center with application whitelist security policy rules so that no traffic using unknown or unsanctioned applications can enter the data center. In addition, protect the data center web servers from denial-of-service (DoS) attacks by applying DoS Protection policy rules (with DoS Protection profiles) to external traffic destined for the data center web server tier.

Recommended For You