ProSecure Unified Threat Management (UTM) Appliance

6.Configure the policy as explained in the following table:

Table 56. Application Control Policy pop-up screen settings

Setting

Description

 

Policy for a category of applications

 

 

Application Policy

From the drop-down list, select the action for the policy of the selected category of

 

applications:

 

Allow. The applications in the selected category are allowed.

 

Drop. The applications in the selected category are blocked.

 

Log Only. The applications in the selected category are allowed, but traffic is

 

logged.

Bandwidth Profile

From the drop-down list, select the bandwidth profile that is assigned to the selected

 

category of applications, or leave the default selection (None). By default, no profile

 

is assigned. For information about bandwidth profiles, see Create Bandwidth

 

Profiles on page 171.

 

 

Traffic Meter Profile

From the drop-down list, select the traffic meter profile that is assigned to the

 

selected category of applications, or leave the default selection (None). By default,

 

no profile is assigned. For information about traffic meter profiles, see Create Traffic

 

Meter Profiles on page 174.

 

 

QoS Profile

From the drop-down list, select the QoS profile that is assigned to the selected

 

category of applications, or leave the default selection (None). By default, no profile

 

is assigned. For information about QoS profiles, see Create Quality of Service

 

Profiles on page 169.

Policy for an individual application

Note: The content of a pop-up screen for an individual application depends on the application. The previous figure is just an example for one application.

Application Policy

(action) for all behaviors

From the drop-down list, select the action for the policy of

 

 

the selected application:

 

 

Allow. The application is allowed.

 

 

Drop. The application is blocked.

 

 

Log Only. The application is allowed, but traffic is

 

 

logged.

 

 

 

 

Specify the action(s) for

If access to an application consists of two steps such as

 

each behavior.

first logging in and then connecting, you can select the

 

Note: This option is

action for each step:

 

Login. From the drop-down list, select the action:

 

displayed for select

- Allow. Logging in to the application is allowed.

 

applications only.

 

- Drop. Logging in to the application is blocked.

 

 

 

 

- Log Only. Logging in to the application is allowed,

 

 

but traffic is logged.

 

 

Connect. From the drop-down list, select the action:

 

 

- Allow. Connecting to the application is allowed.

 

 

- Drop. Connecting to the application is blocked.

 

 

- Log Only. Connecting to the application is

 

 

allowed, but traffic is logged.

Content Filtering and Optimizing Scans

246

Page 246
Image 246
NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual Application Control Policy pop-up screen settings, 246, Meter Profiles on