Objects > Services
When you define security policies for specific applications, you can select one or more services to limit the port numbers the applications can use. The default service is
any, which allows all TCP and UDP ports.
The HTTP and HTTPS services are predefined, but you can add additional service definitions. Services that are often assigned together can be combined into service groups to simplify the creation of security policies (refer to Objects > Service Groups).
The following table describes the service settings:
Enter the service name (up to
63characters). This name appears in the services list when defining security policies. The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
Enter a description for the service (up to 255 characters).
Select this option if you want the service object to be available to:
Disable override (
Select this option to prevent administrators from overriding the settings of this service object in device groups that inherit the object. This selection is cleared by default, which means administrators can override the settings for any device group that inherits the object.
Select the protocol used by the service (TCP or UDP).
Enter the destination port number (0 to 65535) or range of port numbers (port1-port2) used by the service. Multiple ports or ranges must be separated by commas. The destination port is required.
Enter the source port number (0 to 65535) or range of port numbers (port1-port2) used by the service. Multiple ports or ranges must be separated by commas. The source port is optional.
Application Override Protocol/Application Tab
Application Override Protocol/Application Tab Select the Protocol/Application tab to define the protocol (TCP or UDP), port, and application that further defines the attributes of the ...
Objects > Service Groups
Objects > Service Groups To simplify the creation of security policies, you can combine services that have the same security settings into service groups. To ...
Objects > Addresses
Objects > Addresses An address object can include an IPv4 or IPv6 address (single IP, range, subnet) or a FQDN. It allows you to reuse ...
Objects > Application Groups
Objects > Application Groups To simplify the creation of security policies, applications requiring the same security settings can be combined by creating an application group. ...
Data Pattern Settings
Data Pattern Settings Select Objects Custom Objects Data Patterns to define the categories of sensitive information that you may want to filter. For information on ...
Policy Objects A policy object is a single object or a collective unit that groups discrete identities such as IP addresses, URLs, applications, or users. ...
Configure the VM-Series Firewall for Securing Outbound Acce...
Configure the VM-Series Firewall for Securing Outbound Access from the VPC The Mgmt-FW in this use case is the VM-Series firewall that secures inbound management ...
Objects > Authentication
Objects > Authentication An authentication enforcement object specifies the method and service to use for authenticating end users who access your network resources. You assign ...
Objects > Security Profile Groups
Objects > Security Profile Groups The firewall supports the ability to create Security Profile groups , which specify sets of Security Profiles that can be ...