HP VPN Firewall Appliances Attack Protection Configuration Guide

146
Figure 124 Applying a content monitoring policy
4. Configure the content monitoring policy application as described in Table 32.
5. Click Apply.
Table 32 Configuration items
Item Descri
p
tion
Source Zone
Select the source zone to which to
apply the content monitoring
policy.
IMPORTANT:
You can configure only one content
monitoring policy application for a pair of
source and destination security zones.
When the source zone and the destination
zone are different zones, specify the
internal trusted zone as the destination
zone and the external untrusted zone as the
source zone.
Do not use the Management, Any, or Local
zone as the source or destination zone.
Destination Zone
Select the destination zone to
which to apply the content
monitoring policy.
Content
Monitoring Policy
Select the content monitoring policy to be applied.
To add a content monitoring policy to the Content Monitoring Policy list, click the
following Add button (see "Creating a content monitoring policy").
Monitored Zones
Specify the zones to be monitored by the content monitoring policy, which can be the
destination zone, or both the destination and source zones.