User guide
Using Port-Based Security
Chapter 13: Setting Your Security Policy 413
Viewing and Deleting Firewall Rules
To view or delete an existing firewall rule
1. Click Security in the main menu, and click the Rules tab.
The Rules page appears with a list of existing firewall rules.
2. To resize a column, drag the relevant column divider right or left.
3. To delete a rule, do the following.
a. In the desired rule's row, click
.
A confirmation message appears.
b. Click OK.
The rule is deleted.
Using Port-Based Security
The Safe@Office appliance supports the IEEE 802.1x standard for secure authentication of
users and devices that are directly attached to Safe@Office appliance's LAN and DMZ
ports, as well as the wireless LAN. Authentication can be performed either by an external
RADIUS server, or by the Safe@Office appliance's built-in EAP authenticator. For
information on the Safe@Office EAP authenticator, see Using the Safe@Office EAP
Authenticator on page 433.
When an 802.1x security scheme is implemented for a port, users attempting to connect to
that port are required to authenticate using their network user name and password. The
Safe@Office appliance sends the user's credentials to the configured authentication server,
and if authentication succeeds, a connection is established. If the user fails to authenticate,
the port is physically isolated from other ports on the gateway.
If desired, you can specify how users should be handled after successful or failed
authentication. Users who authenticate successfully on a specific port are assigned to the
network with which that port is associated. For example, if the port is assigned to the DMZ