Novell ZENworks Endpoint Security Management 3.5 ユーザーズマニュアル
ZENworks® ESM 3.5
Administrator’s Manual
128
Access Control Lists
There may be some addresses which require unsolicited traffic be passed regardless of the current
port behavior (i.e., enterprise back-up server, exchange server, etc.). In instances where
unsolicited traffic needs to be passed to and from trusted servers, an Access Control List (ACL)
can be created to resolve this issue.
port behavior (i.e., enterprise back-up server, exchange server, etc.). In instances where
unsolicited traffic needs to be passed to and from trusted servers, an Access Control List (ACL)
can be created to resolve this issue.
Note:
This feature is only available in the ESM installation, and cannot be used for UWS security policies.
To access this control, open the Locations tab, click the “+” symbol next to Firewall Settings,
click the “+” symbol next to the desired Firewall, and click the Access Control Lists icon in the
policy tree on the left.
click the “+” symbol next to the desired Firewall, and click the Access Control Lists icon in the
policy tree on the left.
Figure 92 : Access Control Lists Settings
To create a new ACL setting:
Step 1: Select Access Control List from the components tree and click the Add New button
Step 2: Name the ACL and provide a description
Step 3: Enter the ACL address or Macro
Step 4: Enter the ACL type: