Performing Advanced Administration › Map Applications › Create a Subnet Application Mapping Rule
Create a Subnet Application Mapping Rule
Create a Subnet application rule to combine traffic that originates from a particular subnet and mask. The application rule lets users easily report the total traffic that is identified with an application.
Follow these steps:
- Open the Application Definitions page:
- Select Administration from the NFA console menu.
The Administration page opens.
- Select Application Definitions in the Administration menu.
The Application Definitions page opens.
- Verify that Application Mapping is the selected value for Rules.
- Click Add Rule.
The Add Application Mapping dialog opens.
- Verify that Subnet is selected as the rule type at the top of the dialog. (Subnet is selected by default.)
The Add Application Mapping dialog displays the options for a Subnet application mapping rule.
- Specify values for the following settings:
- Subnet: IP address of the data source, expressed in dotted decimal format. To specify a subnet that matches all addresses, use 0.0.0.0/0 as the subnet and mask.
- Mask: Mask to apply to the subnet.
- Protocol: Specifies the protocol of the data that will be affected by the rule, either TCP or UDP.
- Start Port: Beginning of the port range for collected data, expressed in Base 10 decimal format. The Start Port is included in the port range. The maximum port value that is allowed is 65535.
- End Port: Last port in the range to use for collecting data. The End Port is included in the port range.
- Destination Port: Specifies the target port that will collect the mapped data.
- Name: Identifier for the rule as it is listed on the Application Definitions page.
- Description: (Optional) Supplies additional descriptive text to identify the rule type and use.
Note: Multiple application mapping rules that have the same protocol and port destination settings will have the same name.
- When the values are correct for all the required fields, click Save.
The Add Application Mapping dialog closes. The new rule is included in the Application Mapping rule list.
- (Optional) Run reports to verify that all of traffic on the designated target port fits the rule.
- (Optional) Once you notice the effects that new or changed application mapping rules have on reports, you may want to rename the protocol to identify it more clearly for other users.