F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Access Control Configuration Guide-6PW100

31
Figure 24 Security zone management page
2. Click Add.
Figure 25 Creating a security zone
3. Configure the security zone as described in 570HTable 9.
4. Click Apply.
Table 9 Configuration items
Item Descri
p
tion
Zone ID
Specify the zone ID.
The value range depends on the device model. For more information, see
571H
Table 10.
Zone Name Specify the zone name, which cannot be any.
Preference
Set the preference of the security zone.
By default, packets traveling from a higher priority security zone to a lower priority
security zone or between two security zones of the same priority are allowed to pass.
To allow packets from a lower priority security zone to enter a higher priority security
zone, you must deploy an interzone policy. For more information about interzone
policies, see Access Control Configuration Guide.
Share Specify whether the security zone can be referenced by other VDs.
Table 10 Value range for the Zone ID argument
Hardware Value ran
g
e
F1000-A-EI/F1000-S-EI 1 to 512