Define the Initial Internet-to-Data-Center Traffic Security Policy
Define the external application traffic from vendors,
customers, partners, etc., that can access your data center from
As with the other data center traffic flows, tightly
control traffic flowing from the internet to the data center with
application whitelist security policy rules so that no traffic using
unknown or unsanctioned applications can enter the data center.
In addition, protect the data center web servers from denial-of-service
(DoS) attacks by applying DoS Protection policy rules (with DoS Protection profiles) to external traffic destined
for the data center web server tier.