Configuring Egress Network Security
Context
As described in Egress Network Configuration, configuring security policies permits traffic between security zones and allows for advanced security protection functions. With security policies, security threats in each zone can be analyzed to ensure secure and reliable access sources. Table 4-24 describes the recommended security policy design for common zones. You can log in to the web system of the firewall to configure security policies.
Access Network Represented by the Security Zone |
Access Source |
Trustworthiness |
Recommended Security Policy |
---|---|---|---|
Internet |
External users |
Untrusted |
Intrusion detection, URL filtering, and antivirus |
Employees on the go |
Medium |
||
WAN |
Enterprise branch |
Medium |
Intrusion detection and antivirus |
Intranet |
Enterprise employees |
High |
Intrusion detection and antivirus |
Guests |
Low |
Procedure
- Choose Policy > Security Policy > Security Policy. In the Security Policy List area, click Add Security Policy to create a security policy.