F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Access Control Configuration Guide-6PW100
78
308BCreating an interzone policy rule
1. From the navigation tree, select Firewall > Security Policy > Interzone Policy to enter the interzone
policy rule list page.
Figure 70 Interzone policy rule list
Table 23 Operations you can perform on the list
Field O
p
eration
Source Address/Destination
Address/Source
MAC/Destination MAC
Click an address (except any_address and any_mac) to enter the address
resource configuration page, where you can view and modify the address
resource configuration.
For information about address resources, see "Configuring address
resources."
Service
Click a service name (except any_service) to enter the service configuration
page, where you can view and modify the service configuration.
For information about service resources, see "Configuring service
resources."
Content Filtering Policy Template
Click a template name to enter the content filtering policy template
configuration page, where you can view and modify the template
configuration.
For information about content filtering template, see Attack Protection
Configuration Guide.
Status
• shows that the interzone policy rule is enabled. Click Disable to
disable the interzone policy rule.
• shows that the interzone policy rule is disabled. Click Enable to
enable the interzone policy rule.
Log
• shows that logging is enabled for the interzone policy rule. Click
Disable to disable the logging function.
• shows that logging is disabled for the interzone policy rule. Click
Enable to enable the logging function.
in the Operation column
Click the icon for an interzone policy rule to view the logs for traffic that
matches the interzone policy rule.
For information about interzone policy logs, see System Management and
Maintenance Configuration Guide.