ððððŋðē ððķðŋðēððŪðđðđ
ð It can act as a threat intelligence service
ð Rules / Policies defined manually
ð Cloud-managed service
ð Decision â Allow / Deny
ð Inbound / Ingress / Incoming â Allow / Deny
ð Outbound / Eggress / Outgoing â Allow / Deny
ð§ðĩðŋðēðē ðļðķðŧðąð ðžðģ ðŋððđðēð
1ïļâĢ Application rules â Outbound traffic & FQDN
â Inbound traffic â This traffic can come from the internet or other networks.
â Outbound traffic â From your network users to access websites and other resources.
2ïļâĢ Network rules â Inbound / Outbound traffic â Source / Destination will be desired
3ïļâĢ NAT / DNAT rules â Applicable Inbound traffic & VM Public IP
â DNAT â Destination Network Address Translation
ððķðŋðēððŪðđðđ ðĨððđðē ðĢðŋðēð°ðēðąðēðŧð°ðē (ðĢðŋðķðžðŋðķððķðēð)
â Inbound traffic â NAT rules will be given priority.
â Outbound traffic â Network rules will be given priority then applicable rules.
â Inbound rules â NAT / Network rules
â Outbound rules â Network rules / Application rules

Top comments (0)