Objects > Regions
The firewall supports creation of policy rules that apply to specified countries or other regions. The region is available as an option when specifying source and destination for security policies, decryption policies, and DoS policies. You can choose from a standard list of countries or use the region settings described in this section to define custom regions to include as options for Security policy rules.
The following tables describe the region settings:
Select a name that describes the region. This name appears in the address list when defining security policies.
To specify latitude and longitude, select this option and specify the values (xxx.xxxxxx format). This information is used in the traffic and threat maps for App-Scope. Refer to Monitor > Logs.
Specify an IP address, range of IP addresses, or subnet to identify the region, using any of the following formats:
Building Blocks in a Security Policy Rule
Building Blocks in a Security Policy Rule Policies > Security The following section describes each component in a Security policy rule . When you create ...
Policy Objects A policy object is a single object or a collective unit that groups discrete identities such as IP addresses, URLs, applications, or users. ...
Objects > Service Groups
Objects > Service Groups To simplify the creation of security policies, you can combine services that have the same security settings into service groups. To ...
Policies > DoS Protection
Policies > DoS Protection A DoS Protection policy allows you to protect individual critical resources against DoS attacks by specifying whether to deny or allow ...
Objects > Security Profile Groups
Objects > Security Profile Groups The firewall supports the ability to create Security Profile groups , which specify sets of Security Profiles that can be ...
Objects > Schedules
Objects > Schedules By default, Security policy rules are always in effect (all dates and times). To limit a Security policy rule to specific times, ...
Policy Based Forwarding Source Tab
Policy Based Forwarding Source Tab Select the Source tab to define the source zone or source address that defines the incoming source traffic to which ...
Decryption Source Tab
Decryption Source Tab Select the Source tab to define the source zone or source address that defines the incoming source traffic to which the decryption ...
Application Override Destination Tab
Application Override Destination Tab Select the Destination tab to define the destination zone or destination address that defines the destination traffic to which the policy ...