dynamic access lists based on source IPs ?

L3 Networker

dynamic access lists based on source IPs ?

MindeMeld or EDL (external dynamic list) in general can whitelist Office 365 but only per destination. Is there a way do build dynamic access lists based on source IPs ?

Tags (1)
L2 Linker

Re: dynamic access lists based on source IPs ?

I'm not the firewall admin, but my understanding is that once you build a list with MineMeld and bring it into the firewall, you can then apply that list in a policy rule however you want to. I know we have a list that we block in both directions - where the list matches source or destination - and another list that we actually use to add exceptions to the a rule. What I mean by exceptions is there is a 'allow' firewall rule that has the list as the destination with certain port criteria, then a 'block' rule immediately below it that with the same port criteria, destination of 'any' and set to block.

L3 Networker

Re: dynamic access lists based on source IPs ?

Right, I was confused by examples , all of them were showing dynamic lists in destination field of the rule. I veirifed that I can do it in the source field too...cool

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!