In This Section: |
Access Zones lets you create security zones for use in Firewall. Configure Access Zones before configuring Firewall.
There are two predefined Access Zones:
Network locations not placed in the Trusted Zone automatically belong to the Internet Zone.
Note:?Access Zones rules are computer-centric (and not user-centric).
The Trusted Zone contains network objects that are trusted. Configure the Trusted Zone to include only those network objects with which your programs must interact.
Note - Objects not placed in the Trusted Zone are placed automatically in the Internet Zone. |
SmartEndpoint contains an initial Access Zones policy. In the initial policy, these network elements are included in the Trusted Zone:
This object represents all legal IP addresses. In the initial policy, all IP addresses on the Internet are trusted. However, the Access Zones policy is not a policy that is enforced by itself but only as a component of the Firewall policy.
Endpoint computer's loopback address: 127.0.0.1. The Endpoint must always have access to its own loopback address.
Note - Endpoint users must not run software that changes or hides the local loopback address, for example personal proxies that enable anonymous internet surfing. |
Objects in the Trusted Zone
Think about adding these objects to your Trusted Zone: