Instance Name |
Specify a name for the ACL rule.
The name must be 2 to 100 characters in length, and can contain digits, periods (.),
underscores (_), and hyphens (-). The name must start with a letter.
|
Network Type |
- Private Network: The ACL rule controls network traffic originated from and destined for private IP
addresses.
- Public Network: The ACL rule controls network traffic originated from and destined for public IP
addresses.
|
Rule Direction |
- Outbound: The ACL rule controls outbound network traffic of the on-premises network that is
associated with the SAG instance.
- Inbound: The ACL rule controls inbound network traffic of the on-premises network that is
associated with the SAG instance.
|
Policy |
Select Allow or Block to allow or block network traffic.
|
Protocol |
Select the protocol to which the ACL rule applies.
The supported protocols provided in this topic are for reference only. The actual
protocols in the SAG console shall prevail.
|
Source CIDR Block |
- For outbound traffic: Enter the source CIDR block that initiates requests from the
on-premises network.
- For inbound traffic: Enter the source CIDR block from which requests are sent to the
on-premises network.
|
Source Port Range |
Specify the range of the source ports.
Valid values: 1 to 65535 and -1.
Set the source port range in one of the following formats: 1/200, 80/80, and -1/-1. -1/-1 specifies all ports.
|
Destination CIDR Block |
- For outbound traffic: Enter the destination CIDR block to which requests are sent.
- For inbound traffic: Enter the destination CIDR block of the on-premises network to
which requests are sent.
|
Destination Port Range |
Specify the range of the destination ports.
Valid values: 1 to 65535 and -1.
Set the destination port range in one of the following formats: 1/200, 80/80, and -1/-1. -1/-1 specifies all ports.
|
Rule Priority |
Specify the priority of the ACL rule.
Valid values: 1 to 100. A smaller value indicates a higher priority. If rules have
the same priority, the rule that applied to the SAG devices earlier preferentially
takes effect.
The system filters requests based on ACL rules in descending order of rule priorities.
The system performs the action specified in the matched rule on the requests. Requests
that do not match any rule are allowed by default.
|
Application Group |
Select an application group to which you want to apply the ACL rule.
An application group may contain multiple applications. The ACL rule is applied to
all applications in the selected application group.
The supported applications provided in this topic are for reference only. The actual
applications in the SAG console shall prevail.
|
Application |
Select applications to which you want to apply the ACL rule.
You can select an application from the specified application group.
The supported applications provided in this topic are for reference only. The actual
applications in the SAG console shall prevail.
|