Define the Initial Internet-to-Data-Center Traffic Security Policy
Define who can access applications and devices in your
data center from the internet.
As with the other data center traffic flows, tightly
control traffic flowing from the internet to the data center with
application whitelist security policy rules so that no traffic using
unknown or unsanctioned applications can enter the data center.
In addition, protect the data center web servers from denial-of-service
(DoS) attacks by applying DoS Protection policy rules (with DoS Protection profiles) to external traffic destined
for the data center web server tier.