Comodo Help
Find the desired product help
Comodo Dome Firewall

Comodo Dome Firewall

Dome Cloud Firewall Admin Guide

English

Print Help Download Help
Manage Firewall Configuration > Configure System Access
  • Introduction To Dome Cloud Firewall
    • Login To The Dome Cloud Firewall Module
    • Get Started
  • The Dashboard
  • The Main Interface
  • View And Modify System Status And General Configuration
    • Configure GUI Settings
    • View And Update DCF Version
    • Create And Schedule Backup Of DCF State
      • Manually Create A Backup
      • Schedule Backup Operations
      • Encrypt Backup Archives
      • Export A Backup
      • Import A Backup Archive From A Local Computer
      • Roll Back DCF Sate To A Previous Time Point
      • Reset DFS State To Factory Defaults
  • View Dome Cloud Firewall Status
    • System Status
    • Network Status
    • System Usage Summaries
    • Network Traffic
    • Network Connections
    • SSLVPN Connections
  • Network Configuration
  • Configure ICAP Services
  • Manage Firewall Configuration
    • Firewall Objects
      • Manage Firewall Address Objects
      • Manage Firewall Object Groups
      • Manage Firewall Schedules
      • Active Directory Integration
    • Source Network Address Translation
    • Configure Virtual IP For Destination Network Address Translation
    • Configure System Access
    • Configure Firewall Policy Rules
      • Manage Firewall Policy Rules
      • Manage VPN Firewall Rules
  • Configure HTTPS Proxy Services
  • Configure Virtual Private Network Settings
    • SSL VPN Server
      • Configure General SSL VPN Server Settings
      • Manage SSL VPN Client Accounts
      • Configure Advanced SSL VPN Server Settings
      • Configure LDAP Server Settings
      • Configure Clients To Connect To Dome Cloud Firewall
    • SSLVPN Client
    • IPSec Configuration
    • L2TP Server Configuration
    • IPsec / L2TP Users Configuration
  • View Logs
    • Realtime Logs
    • Configure Log Settings
  • About Comodo Security Solutions

Configure System Access


The system access firewall rules manage the access to DCF from the hosts in various internal network zones and external networks.

DCF is pre-configured with firewall rules that allow the hosts in different network zones to access it for selected services like: DNS (through port 53); administrative interface (through port 10443); and DHCP service (through port 67)  hosted by it. These rules are required for the hosts and clients to receive the essential services and for correct functioning of DCF. Whenever a new service is enabled in the appliance, rules are auto-created to provide the service to hosts in the required network zones. The administrator can view the rules but cannot edit or remove the rules. See Show rules of system services for more details on how to view the rules.

The administrator can create and manage new rules to provide/block access to DCF from the internal hosts for specific services and to allow/block access from external networks or specific external IP addresses.

The system access firewall rules can be viewed and managed from the 'System access' interface. 

To open the 'System Access' interface, click 'Firewall' > 'System Access'  from the left hand side navigation.




The interface displays a list of system access firewall rules and enables the administrator to create new rules.

 

System Access Firewall Rules Table - Column Descriptions

  Column

 Description

 #

 ID number of the rule. A packet is allowed or denied based on the first matching rule in the list, regardless of other matching rules that follow, hence the order of the rules play an important role in packet filtering.

 From

The interface of the UTM device at which the traffic is received.

Source

 The firewall object/object group containing the IP addresses or subnet address of the internal or external host(s) from which the traffic originates.

 Service

 The service that uses the traffic, indicated as the protocol and the port used.

Policy

 Indicates the allow/block policy of the rule.

 Remark

 A short description of the rule.

 Count Indicates the number of packets and size of data intercepted by the rule.

 Actions

 Displays control buttons for managing the rule.

  - The checkbox allows the administrator to switch the rule between enabled and disabled states.

  - Opens the 'Edit' interface and enables to edit the parameters of the rule. The Edit interface is similar to Add Rule interface. Refer to the section Creating System Access Firewall rules for more details.

  - Removes the rule.


  • Click the right arrow button beside 'Show rules of system services' to view the list of pre-configured/auto-created firewall rules for system access. These rules cannot be modified or removed. 




From this interface, the administrator can:

  • Create new system access firewall rules

Creating System Access Firewall rules

The system access firewall rules can be created from the 'Add a system access rule' pane by defining the source, the interface of the appliance at which the traffic is received and the service.


To create a new rule

  • Open the 'System access configuration' interface by clicking 'Firewall' > 'System access' from the left hand side navigation.
  • Click the 'Add a new system access rule' link at the top left. The 'Add a system access rule' pane will open.




  • Enter the parameters for the new rule as shown below:
Incoming Interface - Select the interface device(s) or physical ports to which the interface device(s) are connected from the drop-down, at which the traffic is received.

Source Address
- Specify the source of the traffic for which the rule is to be applied. The source can be an internal or external network or a specific IP address, added as a Firewall object.
  • Choose the Firewall Object(s) or Object Group(s) containing the IP address, IP Address Range or the subnet of the host(s) from the drop-down.

If a firewall object covering the IP address/IP Address range or the subnet to be specified has not been created under the Firewall Objects interface previously, you an create a new object from this interface too.


Note: For security and operational efficiency, specify individual or narrow ranges of IP addresses/subnets rather than large subnets. For example, 10.100.150.150/32 or 10.100.150.0/24 instead of 10.100.150.0/8.


To create a new firewall object 

  • Click the drop-down arrow and click 'Create' at the bottom of the list. A new pane for creating a new object will appear.

 
       
  • Name - Specify a name for the object (15 characters max) representing the host(s) included in the object.
  • Comment - Enter a short description of the object.
  • Type - Select the type by which the hosts are to be referred in the object. The available options are: 
  • Subnet – Select this if a sub network of computers is to be covered by the object and enter the sub network address
  • IP address – Select this if a single host is to be covered by the object and enter the IP address of the host
  • IP range - Select this if more than one host is to be covered by the object and enter the IP address range of the hosts
  • Click 'Add'. 
The new object will be added and will be available for selection from the drop-down.



The new object will also be added to the list of objects under Firewall Objects and will be available for selection for creating other firewall rules too. System access rule activities are logged, including date, time, type of event, subject id, component name and event outcome.
Service/Port - Select the type or the service hosted by the source, the protocol and the port used by the service.
  • Service - Choose the type of service from the drop-down
  • Protocol - Choose the protocol used by the service
  • Destination port - Specify the destination port(s) of the service one by one, in the 'Destination Port' text box.

Tip: The appliance is loaded with predefined combinations of service/protocol/port, like HTTP/TCP/80, [ALL]/TCP+UDP/0:65535, or [ANY], which is a shortcut for all services, protocols, and ports. If you want to specify custom protocol/port combination, then select 'User Defined' from the service. You can also specify additional destination ports for standard combinations, for the services that run on ports different from the standard ones.


Policy - Specify whether the packets matching the rule should be allowed or denied from the Policy drop-down. The options available are:

  • Allow - The data packets will be allowed without filtering

  • Drop - The packets will be dropped

  • Reject - The packets will be rejected, and error packets will be sent in response

General Settings - Configure the General Settings to enable/disable the rule, enable/disable logging of packets filtered by the rule, enter a short description and select a position for the rule in the list.

  • Remark - Enter a short description for the rule. The description will appear in the Remark column of the respective Rules interface (Optional)
  • Position - Set the priority for the rule in the list of rules in the respective rules interface. The rules in the iptables are processed in the order they appear on the list.
  • Enabled - Leave this checkbox selected if you want the rule to be activated upon creation.
  • Log all accepted packets - Select this checkbox if you want the packets allowed by the rule are to be logged. See View Logs for more details on configuring storage of logs and viewing the logs.
  • Click 'Add Rule'. 
The new rule will be added and displayed in the screen.

Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.