Objects > Regions
The firewall supports creation of policy rules that apply to specified countries or other regions. The region is available as an option when specifying source and destination for security policies, decryption policies, and DoS policies. You can choose from a standard list of countries or use the region settings described in this section to define custom regions to include as options for Security policy rules.
The following tables describe the region settings:
Enter a name that describes the region (up to 31 characters). This name appears in the address list when defining security policies. The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
To specify latitude and longitude, select this option and specify the values (xxx.xxxxxx format). This information is used in the traffic and threat maps for App-Scope. Refer to Monitor > Logs.
Specify an IP address, range of IP addresses, or subnet to identify the region, using any of the following formats:
Policy Objects A policy object is a single object or a collective unit that groups discrete identities such as IP addresses, URLs, applications, or users. ...
Objects Objects are the elements that enable you to construct, schedule, and search for policy rules, and Security Profiles provide threat protection in policy rules. ...
Building Blocks in a Security Policy Rule
Building Blocks in a Security Policy Rule The following section describes each component in a security policy rule . When you view the default security ...
Policies > DoS Protection
Policies > DoS Protection A DoS Protection policy allows you to protect against DoS attacks by specifying whether to deny or allow packets that match ...
Objects > Service Groups
Objects > Service Groups To simplify the creation of security policies, you can combine services that have the same security settings into service groups. To ...
Device Groups To use Panorama effectively, you have to group the firewalls in your network into logical units called device groups . A device group ...
DNS Overview DNS performs a crucial role in enabling user access to network resources so that users need not remember IP addresses and individual computers ...
Policy Based Forwarding Source Tab
Policy Based Forwarding Source Tab Select the Source tab to define the source zone or source address that defines the incoming source traffic to which ...
Decryption Source Tab
Decryption Source Tab Select the Source tab to define the source zone or source address that defines the incoming source traffic to which the decryption ...