Smoothwall access Page

Use this page to control access to services running on the Smoothwall Firewall for both internal and external traffic.

Navigation: NETWORK > Firewall > Smoothwall access.

Smoothwall access
Name The meaningful name for this rule. If logging is turned on for this rule, the name is included in log entries. From the Smoothwall Firewall log viewer, you can click the rule name to return to this page.
Source IPs To apply this rule to all IP addresses, use Inbound interfaces instead. Typically, you use this when including an IP address subnet, but have one or two addresses within that subnet where the rule doesn't apply. If no IP addresses are selected for this rule, Any is shown in the Smoothwall access rules table, meaning all IP addresses are processed.
Inbound interfaces The Inbound interfaces network traffic arrives at. Use this option instead of Source IP addresses to apply this rule to all traffic using these interfaces. If no interfaces are selected for this rule, Any is shown in the Smoothwall access rules table, meaning all interfaces are used for this rule.
Destination IPs the Destination IP addresses to where this rule forwards traffic. To apply this rule to all IP addresses, use Outbound interfaces instead. Any address objects and object groups created here are also made available for use in future rules, or existing rule amendments. If no IP addresses are selected for this rule, Any is shown in the Smoothwall access rules table, meaning all IP addresses are processed.
Services The Services relevant for this rule. Leave blank to include all services. If you're creating an Accept rule, this setting is mandatory; at least one service must be selected. For Drop or Reject rules, you can optionally leave this blank to cover all services listed. If no services are selected for this rule, Any is shown under Services in the Smoothwall access rules table, meaning all services received are processed. The IDex Cluster shares the information received from the IDex client and the IDex agent among all nodes in a Central Management cluster, so that web filtering requests can be load-balanced between them.
Groups Group members are identified by their IP address. A user doesn't need to be logged into be considered a member of a group; traffic from those IP addresses is assumed to be from those group members. You can create rules for traffic that ORIGINATES from groups. Select those Groups to match against. You can't create rules that allow traffic TO user groups. If no groups are selected for this rule, Any is shown under Groups in the Smoothwall access rules table.
Action

The action that the Smoothwall Firewall performs for this traffic:

Accept Matching network traffic is allowed through to its destination.
Drop Matching network traffic is silently dropped.
Reject Matching network traffic is rejected, and an ICMP destination-unreachable is sent back to the originator.
Log

Logs matching network connections to the Smoothwall Firewall log. We recommend that you enable this only for Drop or Reject Smoothwall Firewall rules because this can generate a large amount of log data.

Enabled Indicates that the rule is active.