Creating a security profile group
You can create custom security profile groups and add security profiles to be applied to network traffic.
You can create up to 64 security profile groups.
To create a security profile group:
- In the main menu of the Open Single Management Platform Console, go to the Application & Services → NGFW section.
- Select the Objects tab, then select Security profile groups.
The table of security profile groups is displayed.
- Click the Create button in the upper part of the table.
This opens the profile group creation pane, New security profile group.
- In the Name field, specify the name of the new security profile group.
The name of the profile group must be unique. The maximum length of the name is 256 characters.
- If necessary, in the Description field, enter a description for the new security profile group.
This field is optional. The maximum length of the description is 256 characters.
- Add security profiles to the profile group as necessary:
- Enable the toggle switch next to security engines that you want to use in the profile group.
By default, when a security engine is enabled, its default security profile is selected.
- If necessary, select a custom security profile by doing one of the following:
- In the Profile drop-down list, select an existing security profile.
- Click the Create button to create a new security profile, then select this profile from the Profile drop-down list.
Consider the following when configuring security profiles for a security profile group:
- In a security profile group, you can enable one or more different security engines.
- You can select only one security profile for each enabled security engine.
- You can add the same security engine profiles to multiple security profile groups.
- Click the Create button in the lower part of the pane to create the profile group.
- Apply the OSMP policy changes by clicking the Commit and push button.
The new profile group is displayed in the table of profile groups. You can add this profile group to a security rule with the Inspect action.
Page top