๐๐๐๐ฟ๐ฒ ๐๐ถ๐ฟ๐ฒ๐๐ฎ๐น๐น
๐ It can act as a threat intelligence service
๐ Rules / Policies defined manually
๐ Cloud-managed service
๐ Decision โ Allow / Deny
๐ Inbound / Ingress / Incoming โ Allow / Deny
๐ Outbound / Eggress / Outgoing โ Allow / Deny
๐ง๐ต๐ฟ๐ฒ๐ฒ ๐ธ๐ถ๐ป๐ฑ๐ ๐ผ๐ณ ๐ฟ๐๐น๐ฒ๐
1๏ธโฃ Application rules โ Outbound traffic & FQDN
โ Inbound traffic โ This traffic can come from the internet or other networks.
โ Outbound traffic โ From your network users to access websites and other resources.
2๏ธโฃ Network rules โ Inbound / Outbound traffic โ Source / Destination will be desired
3๏ธโฃ NAT / DNAT rules โ Applicable Inbound traffic & VM Public IP
โ DNAT โ Destination Network Address Translation
๐๐ถ๐ฟ๐ฒ๐๐ฎ๐น๐น ๐ฅ๐๐น๐ฒ ๐ฃ๐ฟ๐ฒ๐ฐ๐ฒ๐ฑ๐ฒ๐ป๐ฐ๐ฒ (๐ฃ๐ฟ๐ถ๐ผ๐ฟ๐ถ๐๐ถ๐ฒ๐)
โ Inbound traffic โ NAT rules will be given priority.
โ Outbound traffic โ Network rules will be given priority then applicable rules.
โ Inbound rules โ NAT / Network rules
โ Outbound rules โ Network rules / Application rules
Top comments (0)