Object based Firewall from SafeUTM
SafeUTM Object Based Firewall is a module that uses an object-oriented approach to create and enforce firewall policies.

In traditional firewalls, rules are typically defined based on IP addresses, ports, or protocols. However, in SafeUTM, policies are defined based on objects such as:
This allows for more granular control and enhanced security as rules can be based on more than just traditional IP-centric rules.

With SafeUTM administrators experience a new level of flexibility and ease in managing and updating firewall rules.
Users
Groups
Applications
Domains
Subnets
Protocols
Ports
Scheduling time
Why Object based Firewall is better than a regular firewall?
The object-based firewall approach provides more flexibility and granularity in defining access control rules compared to traditional firewalls. It allows you to create complex rules based on different attributes of the objects, making it easier to manage and control traffic in your network.
As a first step of SafeUTM configuration, we strongly recommend creating all necessary objects that represent your infrastructure. This way, you can enforce different levels of access and restrictions based on the objects, rather than dealing with individual IP addresses or port numbers.

Once the objects are created, you can define access rules and policies based on these objects.

For example, you can easily create an advanced policy for a specific web server (even with multiple variables such as IP address, HTTP port, scheduled accessible time, etc.), just by specifying particular objects. Since you operate with named objects instead of remembering specific IP addresses, human errors, leading to misconfiguration can be avoided.
One more significant advantage of the Object Based Firewall is the ability to easily adapt and scale as your infrastructure grows or changes. Instead of having to reconfigure multiple firewall rules every time a change is made, you can simply update the relevant objects.

Overall, SafeUTM streamlines the management and maintenance of firewall rules, enhancing security and reducing the chance of errors due to manual entry.
1
2