Comodo Help
Find the desired product help
Comodo Dome Firewall

Comodo Dome Firewall

Dome Firewall Virtual Appliance Admin Guide

English

Print Help Download Help
Manage Firewall Configuration > Firewall Objects > Manage Firewall Address Objects
  • Introduction To Comodo Dome Firewall - Virtual Appliance
    • Install Dome Firewall And Login To The Administrative Console
  • The Main Interface
  • The Dashboard
  • View And Modify System Status And General Configuration
    • Manage Admin Accounts
      • Add And Manage Administrators
      • Manage Administrative Roles
    • License Activation
    • SNMP Settings
    • Central Management
    • Configure SSH Access
    • High Availability
    • View And Update Firmware Version
    • Create And Schedule Backup Of DFW State
      • Manually Create A Backup
      • Schedule Backup Operations
      • Encrypt Backup Archives
      • Export A Backup
      • Import A Backup Archive From A Local Computer
      • Roll Back The Virtual Appliance To A Previous Time Point
      • Reset The Virtual Appliance To Factory Defaults
    • Shutdown Or Restart The Dome Firewall Virtual Appliance
  • View DFW Virtual Appliance Status
    • System Status
    • Network Status
    • System Usage Summaries
    • Network Traffic
    • Network Connections
    • SSLVPN Connections
  • Network Configuration
    • Configure Interface Devices, Uplinks And VLANs
      • Configure Interface Devices
      • Add And Manage Gateway Uplink Devices
      • Create VLANs
    • Routes
      • Add And Manage Static Routes
      • Add And Manage Policy Routing Rules
  • Configure DFW Virtual Appliance Services And Protection Settings
    • DHCP Server
    • Advanced Threat Protection
      • Manage The ATP Profiles
      • Comodo Antivirus
    • Time Server
    • Intrusion Prevention
      • Configure Intrusion Prevention System
      • Manage IPS Rulesets
      • Manage Application Identification Rulesets
    • Configure Wireless Hotspot
      • Configure Captive Portal Service
      • Customize The Login Page
      • Add And Manage Permanent Users
    • Internet Content Adaptation Protocol
    • Quality Of Service
  • Manage Firewall Configuration
    • Firewall Objects
      • Manage Firewall Address Objects
      • Manage Firewall Object Groups
      • Manage Firewall Schedules
      • Active Directory Integration
    • Destination Network Address Translation
    • Source Network Address Translation
    • Configure System Access
    • Configure Firewall Policy Rules
      • Manage Firewall Policy Rules
      • Manage VPN Firewall Rules
  • Configure Proxy Services
    • HTTP/HTTPS Proxy Server
      • Configure URL And Content Filtering
      • HTTPS Proxy
  • Configure Virtual Private Network Settings
    • SSL VPN Server
      • Configure General SSL VPN Server Settings
      • Manage SSL VPN Client Accounts
      • Configure Advanced SSL VPN Server Settings
      • Configure Clients To Connect To Dome Firewall
    • IPsec Configuration
    • Configure L2TP Server
    • Configure IPSec/L2TP Users
  • View Logs
    • Realtime Logs
    • Configure Log Settings
    • Generate Reports
  • Appendix - Minimum Requirements For Software Installations

Manage Firewall Address Objects


    Click 'Firewall' > 'Objects' to open the firewall objects interface.

    • Firewall address objects represent a specific address or a group of addresses in your network.
      • Firewall objects can then be referenced when creating a firewall rule, saving you time.
      • You can also create firewall object groups to further streamline policy and rule creation.

      Firewall address objects can be edited at anytime. Any change to an object will be reflected in all rules which include the object.


      To create or manage firewall address objects

      • Click 'Firewall' > 'Objects' in the left-hand menu.
      • Click the 'Firewall Addresses' tab.


       

      The addresses interface shows all firewall address objects added to Dome Firewall and allows you to create new objects.


      Firewall Address Objects Table - Column Descriptions

      Column

      Description

      Name

       Label of the firewall address object. The object name will become available for selection in the 'source' and 'destination' address fields when creating a policy.

      Address

      The IP address(s) of the host computer(s) contained in the object.

      Type

      The reference type of the hosts in the object. Can be IP address, IP range, subnet or fully qualified domain name (FQDN).

      Comment

      A short description of the object.

      Actions

      Control buttons to manage the object.

      - 'Edit.' Allows you to modify object parameters. The Edit interface is similar to the 'Add Object' interfacE. See Creating a Firewall Address Object for more details.

      - Removes the object.

      Note: The object which is currently referenced in a firewall rule or in a group cannot be removed. To remove a group, the group is to be first removed from the firewall rule or group in which it is included.


      Create a Firewall Address Object


      A firewall address object can be created in two ways:
      • In the 'Add an Address' area. You need to define a name and addresses for the object. See below for more details.

      • Import users from Active Directory. See Add User to Firewall Objects in Active Directory Integration.
      To create a new object
      • Click 'Firewall' > 'Objects' in the left-hand navigation
      • Click the 'Firewall Addresses' tab
      • Click 'Add an address':




      Enter the parameters for the new object as shown below:
      • Name - Create a label for the object (15 characters max). Only alphanumeric characters and two special characters '-' and '_' are allowed. Ideally, the object name should clearly identify the hosts in the object.
      • Comment - Enter a short description of the object.
      • Type – Address type. The available options are:
      • Subnet - Select if the object should point to a sub-network of computers. Enter the subnet address in the space provided.
      • IP address - Select if the object should point to a single IP address. Enter the address in the space provided.
      • IP range - Select if the object should point to a range of IP addresses. Enter the range in the space provided.
      • FQDN – Select if the object should point to a fully qualified domain name. Enter the domain in the space provided.
      • Click 'Add'. The new object will be added to the list.
      • The object will become available for selection as a source or destination when creating a firewall rule. You can locate the object by typing the first few letters of its name:



      Our Products
      • Free Antivirus
      • Free Internet Security
      • Website Malware Removal
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Windows Antivirus
      • Antivirus for Windows 7
      • Antivirus for Windows 8
      • Antivirus for Windows 10
      • Antivirus for MAC
      • Antivirus for Linux
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scanner
      • Free Device Manager for Android
      • Free Demo
      • Network Security
      • Endpoint Protection
      • Antivirus for Android
      • Comodo Antivirus
      • Wordpress Security
      Cheap CDN
      • Bootstrap CDN
      • Semantic UI CDN
      • Jquery CDN
      • CDN Plans
      • CDN
      • Free CDN
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Website Down
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • Website Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      • MDR Services
      • EDR Services
      • Ransomware Prevention
      • Managed IT Support Services
      • EDR
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy

      © Comodo Group, Inc. 2023. All rights reserved.