IPv6 is supported for Access Rules. Search for IPv6 Access Rules in the Access Rules Search section. A list of results displays in a table.From there you can click the Configure icon for the Access Rule you want to edit. The IPv6 configuration for Access Rules is almost identical to IPv4.
2 Expand the Firewall tree and click Access Rules. The Access Rules page displays. The Firewall > Access Rules page enables you to select multiple views of Access Rules, including drop-down boxes, Matrix, and All Rules. The default view is the Matrix View that provides a matrix of source and destination nodes between LAN, WAN, VPN, Multicast, and WLAN.
3 From the Matrix View, click the Edit icon (). for the source and destination interfaces for which you will configure a rule. The Access Rules table for that interface pair displays.
4 Below the Access Rules table, click Add Rule.
6
7 Select a service from the from the Service Name list box. If the service does not exist, refer to Configuring Service Objects .
8 Select the source Address Object from the Source list box.
9 Select the destination Address Object from the Destination list box.
10 Specify if this rule applies to all users or to an individual user or group in the Users Allowed list box.
11 Specify when the rule will be applied by selecting a schedule or Schedule Group from the Schedule list box. If the rule is always applied, select Always on. If the schedule does not exist, refer to Configuring Schedules .
12
13 Check Allow Fragmented Packets to allow fragmented packets.
14 (optional) Click Don’t invoke Single Sign ON to Authenticate Users. This option is available when Enable SSO agent authentication is clicked in the Users > Settings screen. This option is disabled when All is selected from the Users Included drop-down and None is selected from the Users Excluded drop-down.
15 (optional) Click Enable Management. If this option is enabled, both management and non-management traffic is allowed.
16 Add any comments to the Comment field.
17 Click the Advanced tab.
18 Specify how long (in minutes) TCP connections might remain idle before the connection is terminated in the TCP Connectivity Inactivity Timeout field.
19 Specify how long (in seconds) UDP connections might remain idle before the connection is terminated in the UDP Connectivity Inactivity Timeout field.
20 Specify the percentage of the maximum connections this rule is to allow in the Number of connections allowed (% of maximum connections) field.
21 Set a limit for the maximum number of connections allowed per source IP Address by selecting Enable connection limit for each Source IP Address and entering the value in the Threshold field.(Only available for Allow rules).
22 Set a limit for the maximum number of connections allowed per destination IP Address by selecting the Enable connection limit for each Destination IP Address field and entering the value in the Threshold field. (Only available for Allow rules).
23 Click the QoS tab. For information on configuring the QoS tab, refer to Configuring Quality of Service Mapping .
24 Click the Bandwidth tab. The Bandwidth page displays.
26 To enable outbound bandwidth management for this service, select Enable Outbound Bandwidth Management.
a Enter the amount of bandwidth that is always available to this service in the Guaranteed Bandwidth field, and select either % or Kbps in the pull-down list. Keep in mind that this bandwidth is permanently assigned to this service and not available to other services, regardless of the amount of bandwidth this service does or does not use.
b Enter the maximum amount of bandwidth that is available to this service in the Maximum Bandwidth field.
c Select the priority of this service from the Bandwidth Priority list box. Select a priority from 0 (highest) to 7 (lowest).
27 To enable inbound bandwidth management for this service, select Enable Inbound Bandwidth Management.
a Enter the amount of bandwidth that is always available to this service in the Guaranteed Bandwidth field, and select either % or Kbps in the pull-down list. Keep in mind that this bandwidth is permanently assigned to this service and not available to other services, regardless of the amount of bandwidth this service does or does not use.
b Enter the maximum amount of bandwidth that is available to this service in the Maximum Bandwidth field.
c Select the priority of this service from the Bandwidth Priority list box. Select a priority from 0 (highest) to 7 (lowest).
28 To track bandwidth usage for this service, select Enable Tracking Bandwidth Usage.
29 To add this rule to the rule list, click OK. You are returned to the Access Rules page.
30 If the network access rules have been modified or deleted, you can restore the Default Rules. The Default Rules prevent malicious intrusions and attacks, block all inbound IP traffic and allow all outbound IP traffic. To restore the network access rules to their default settings, click Restore Rules to Defaults and then click Update. A task is scheduled to update the rules page for each selected SonicWALL appliance.
31 To modify a rule, click its Edit icon (). The Add/Modify Rule dialog box displays. When you are finished making changes, click OK. Dell SonicWALL GMS creates a task that modifies the rule for each selected SonicWALL appliance.
32 To enable logging for a rule, select Logging.