Comodo Help
Find the desired product help
Comodo Dome Firewall

Comodo Dome Firewall

Dome Firewall Central Manager Admin Guide

English

Print Help Download Help
Firewall Management > Configure System Access Rules
  • Introduction To Dome Firewall Central Manager
    • Sign-up For Firewall Central Manager
    • Setup Dome Firewall Central Manager
    • Integrate Central Manager With Comodo One / Comodo Dragon / ITarian
    • Login To The Admin Console
    • Change Password
    • Add Organizations
    • Enroll Dome Firewall Devices
  • The Main Interface
  • The Dashboard
    • View Details Of A Firewall Device
    • Quick Actions On A Firewall Device
      • Backup/Restore A Firewall Device
      • Configure SSH Access For A Firewall Device
      • Network Configuration
    • Access Admin Console Of A Firewall Device
  • Manage System Status And General Configuration
    • Update Firmware Version
    • View And Upgrade Central Manager License
    • View Management Tasks
  • Customer Management
    • Manage Organizations
    • Activate Firewall Licenses
  • Approve Firewall Device Enrollment
  • Add Interfaces
  • Firewall Management
    • Configure Firewall Policy Rules
    • Manage Firewall Address Objects
    • Manage Firewall Object Groups
    • Configure Destination Network Address Translation Rules
    • Configure Source Network Address Translation Rules
    • Configure System Access Rules
  • Configure Virtual Private Network Settings
    • Configure IPSec/L2TP Users
    • IPSec Configuration
    • Configure L2TP Server
  • Manage Advanced Threat Protection Profiles
  • Manage URL And Content Filtering Profiles
  • Intrusion Prevention
    • Configure The Intrusion Prevention System
    • Manage IPS Rulesets
    • Manage Application Identification Rulesets
  • About Comodo Security Solutions

Configure System Access Rules

 

  • System access rules govern the rights that various hosts and zones have to access a firewall device.
  • Click 'Firewall' > 'System Access' on the left to open the rules interface.
  • Select a firewall device or organization from the gray bar above the table.
  • The system access table shows all existing access rules for the organization or device, and allows you to add new rules.




System Access Rules Table - Column Descriptions

Column

Description

#

ID number of the rule. A packet is allowed or denied based on the first matching rule in the list, regardless of other matching rules that follow.

From

The interface over which traffic is received. E.g. 'LAN', 'Internet', 'WiFi'.

Source

The firewall address object/object group from which traffic originates.

Service

The port and protocol used by traffic which will be affected by this rule.

Policy

Action taken on traffic affected by this rule.

Remark

A short description of the rule.

Actions

Controls for managing the rule.

- Enable or disable the rule.

- Edit rule parameters. The 'Edit' interface is similar to the 'Add/Update System Access Rule' interface.

- Removes the rule.


To create a new rule

  • Click 'Firewall' >  'System Access' on the left
  • Select a firewall device or organization from the gray bar above the table
  • Click the 'Add a New System Access Rule' link button. The rule configuration screen will open:




  • Enabled - Leave selected if you want the rule to be activated immediately after saving. You can enable or disable the rule later in the rules list if required.
  • Log all accepted packets - Enable to create a record of all data packets accepted by the rule.
  • Incoming Interface - Select the interface from which traffic is received
  • Source Address - The firewall address object/object group from which traffic originates.
  • Service/Protocol/Port
  • Service - Choose the service over which the traffic is sent. Selecting a service will auto-populate the 'Protocol' and 'Destination Port' fields. You can, of course, edit the port fields if required.
  • Protocol - Choose the protocol used by the service. Selecting a protocol will change the 'Service' to 'User defined'. Assuming a match on incoming interface and source address, the rule will affect all traffic using the chosen protocol regardless of service type.
  • Destination port - Specify the destination port(s) of the service one by one.
  • Action - Specify whether packets matching the rule should be allowed or denied. The options available are:
  • Accept - The data packets will be allowed without filtering
  • Drop - The packets will be denied
  • Reject - The packets will be rejected, and error packets will be sent in response
  • Remark - Enter a short description of the rule (optional)
  • Position - Set the priority for the rule in the list of rules in the respective rules interface. The rules in the IP tables are processed in the order that appears on the list.
  • Click 'Save'. The new system access rule will be created and applied to the selected organization or device.

Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.