Example: Using Access rules to forward traffic
The example company has decided to screen HTTP and HTTPS connections using a proxy service hosted on premises.
The administrators have already installed the proxy on premises and configured it to process HTTP and HTTPS traffic according to the company’s policy.
To configure the forwarding, the administrators:
- Create a Proxy Server element to represent their proxy service.
- Create an Access rule that forwards traffic to the proxy service.
- Create another Access rule that forwards traffic from the proxy service to the Internet.
ID | Source | Destination | Service | Action |
---|---|---|---|---|
14.1 | Proxy Server | ANY | The HTTP and TLS Network Application elements. | Allow. |
14.2 | Internal Network | ANY | The HTTP and TLS Network Application elements. | Allow. Action options: Proxy Server selected for the Forward Traffic to option. |
Connections opened from the internal network are forwarded to the proxy in rule 14.2. The proxy then connects to the actual destination, which is allowed in rule 14.1. Rule 14.1 is higher in the rules to avoid potential loops if the Proxy Server is in the same internal network that is reference in rule 14.2