Access Policy
Categories:
less than a minute
An access policy is a list of rules that each allow, reject, or drop traffic at the VPN level.
If no rules are defined, traffic will not pass through the virtual network.
A rule can match traffic based on the following fields:
Field Name | Description |
---|---|
Action | Whether to ALLOW, DROP, or REJECT the traffic. |
Protocol | You can choose ANY, UDP, ICMP, or TCP. |
Source | The source of the traffic. You can select a network object, a network group, or provide a CIDR. |
Destination | The destination of the traffic. You can select a network object, a network group, or provide a CIDR. |
Line Number | Rules are evaluated starting with the lowest numbered rule. Once a rule matches, later rules are ignored even if they might also match the traffic. |
Port Range | For TCP and UDP traffic, you can specify a port (e.g., 80) or a range (e.g., 8000-9000). |
Note that all specified fields must be matched for the rule to match.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.