- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-26-2010 08:00 AM
It would be very useful to use a public DNS name as a source address or destination address directly in Security Rules. Currently, a domain/category etc.. can be blocked or allowed through the URL filter as a destination. However this can make the single outbound rule function as an end allow and end deny. This is a challenge if you need additional outbound policies to be evaluated for match further down in order or if there are rules setup as an IDS/IPS.Does that make sense? Maybe I'm not aware of a way to already do this.
05-26-2010 02:35 PM
Hello Nrouten,
this is a popular request that should be considered on our road map. Please submit a feature/enhancement request through your sales contact in order this can be pushed.
thanks,
Stephen
05-26-2010 02:35 PM
Hello Nrouten,
this is a popular request that should be considered on our road map. Please submit a feature/enhancement request through your sales contact in order this can be pushed.
thanks,
Stephen
05-27-2010 01:52 PM
Great, thank you. We submitted the request awhile back.
11-17-2010 10:22 AM
Hi Stephen,
Any update or ETA on this? A customer wantd to use a DNS name in the source of a rule, such as "jsmith.dyndns.org" and have it resolve itself to an IP dynamically.
Thanks.
11-17-2010 02:20 PM
Hello,
your sales contact would be the best resource for tracking on a feature request that you submitted.
But regarding this feature, it will be in our NICE release which is scheduled to be available by the beginning of 2011.
thanks,
Stephen
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!