SonicOSX 7 Rules and Policies
- SonicOSX 7 Rules and Policies
- Settings
- Security Policy
- NAT Policy
- About NAT in SonicOSX
- About NAT Load Balancing
- About NAT64
- About FQDN-based NAT
- About Source MAC Address Override
- Viewing NAT Policy Entries
- Adding or Editing NAT or NAT64 Policies
- Deleting NAT Policies
- Creating NAT Rule Policies: Examples
- Creating a One-to-One NAT Policy for Inbound Traffic
- Creating a One-to-One NAT Policy for Outbound Traffic
- Inbound Port Address Translation via One-to-One NAT Policy
- Inbound Port Address Translation via WAN IP Address
- Creating a Many-to-One NAT Policy
- Creating a Many-to-Many NAT Policy
- Creating a One-to-Many NAT Load Balancing Policy
- Creating a NAT Load Balancing Policy for Two Web Servers
- Creating a WAN-to-WAN Security Policy for a NAT64
- DNS Doctoring
- Routing Rules
- Decryption Policy
- DoS Policy
- Endpoint Policy
- Shadow
- SonicWall Support
App/URL/Custom Match
You can add additional rule attributes by indicating the Match Operation, type of application to which this rule would apply, whether or not to include Matched App Signatures, type of Web Categories, URLs, and Custom Matches that could be applied.
To fill the App/URL/Custom Match options
- Navigate to POLICY | Rules and Policies > Security Policy.
- Click Add. The Adding Rule dialog displays.
-
Click the App/URL/Custom Match tab.
-
Match Operation Allows you to indicate whether to use either rule or both rules.
Application Select which group application to apply to this rule.
AND All Matched APP Signatures When this option is enabled, when more than one App Signature is addressed within a flow or session, then all signatures must be included in the app group configured previously, for the match to be successful. When this option is disabled, any one signature among all the signatures addressed would result in a successful match.
Web Category Indicate whether to apply defined group web categories.
URL Indicate whether to restrict defined URLs.
Custom Match Indicate which custom match groups to include in the rule.
- Click Save to apply your changes. Click Action Profile to continue with the configuration.
Was This Article Helpful?
Help us to improve our support portal