Cloud Firewall - Access Control Policies of NAT Firewall Support Threat Intelligence Address Books
Mar 01 2024
Cloud FirewallContent
Target customers: enterprises that want to implement security management by using threat intelligence-based access control policies. Features released: 1. Threat intelligence address books can be referenced when users create access control policies for NAT firewalls. The threat intelligence includes malicious IP addresses in Tor networks, central control IP addresses of remote control software, central control IP addresses of mining programs, central control IP addresses of command and control (C&C) servers, and central control IP addresses of botnets. 2. Changes to threat intelligent address books are automatically synchronized to the access control policies created for NAT firewalls that reference the address books.