Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Define internal network settings
 
Related topics:
 
Use the Internal Networks section of the page to optionally:
*
*
*
To begin:
1.
Select the Policy Assignment tab and click Add to identify a network to which you want to assign a policy other than the appliance default. In the Add Policy Assignment dialog box:
a.
Enter a unique Name for the network.
b.
Use the Type list to indicate how you want to identify the network (IP address, Subnet, or IP range).
c.
d.
Select a Policy from the drop-down list.
e.
Click Add.
Repeat these steps for each internal network to which you want to assign a policy.
Note that networks (IP address ranges and subnets) may not overlap, and you can assign only one policy to each network.
2.
Select the Trusted Networks tab and click Add to identify IP addresses or address ranges whose traffic should not be analyzed. In the Add Trusted Network dialog box:
a.
Enter a unique Name for the network.
b.
Use the Type list to indicate how you want to identify the network (IP address, Subnet, or IP range).
c.
d.
Indicate whether to Bypass analysis for traffic from this network, Bypass analysis for traffic to this network, or both.
e.
Click Add.
Repeat these steps for each internal network whose incoming or outgoing traffic, or both, should not be analyzed.
3.
Select the Session-Based Authentication Tab and click Add to define network addresses and IP address ranges that should use session-based authentication. The defined addresses will be authenticated based on a cookie sent to the browser on the local machine.
This authentication is valid for the length of time defined in the Session timeout drop-down list (under General).
a.
Enter a unique Name for the network.
b.
Use the Type list to indicate how you want to identify the network (IP address, Subnet, or IP range).
c.
d.
Click Add.
Repeat these steps for each internal network that will use session-based authentication.
 
Note 

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2024 Forcepoint. All rights reserved.