Configuring a Security Policy

Policy > Security Policy

A security policy can allow or deny the traffic forwarding between security zones/segments.

In the Security Policy page, you can perform the following actions:

Options in the Policy Rule Configuration dialog:

Option Description
Basic

Source Information

Specify the source information of the traffic:

  • Zone: Specify the source zone of the traffic. By default, Any is selected. To search zones, enter the keyword in the textbox in the drop-down list and then press the Enter key. To create a new zone, click New Zone in the drop-down list. For more information on zone, view Configuring a Security Zone
  • Address Entry: Specify the source address of the traffic. By default, Any is selected. To search address entries, enter the keyword in the textbox in the drop-down list and then press the Enter key. To add more source addresses, click Multiple and then the Address Configuration dialog appears. In the dialog. Select the address type, enter the corresponding address, and then click Add to add the newly-specified addresses into the list.
  • User: Specify the user or user group of the source traffic. To add more users or user groups, click Multiple. In the pop-up dialog, select the type and the AAA server, enter the username/user group name in the textbox or select the user/user group from the drop-down list, and then click Add to add the user/user group into the list.

Destination Information

Specify the destination information of the traffic:

  • Zone: Specify the destination zone of the traffic. By default, Any is selected. To search zones, enter the keyword in the textbox in the drop-down list and then press the Enter key. To create a new zone, click New Zone in the drop-down list. For more information on zone, view Configuring a Security Zone
  • Address Entry: Specify the destination address of the traffic. By default, Any is selected. To search address entries, enter the keyword in the textbox in the drop-down list and then press the Enter key. To add more destination addresses, click Multiple. In the pop-up dialog. Select the address type, enter the corresponding address, and then click Add to add the newly-specified addresses into the list.
Other Information

Specify other information of the traffic:

  • Service Book: Specify the service of the traffic. By default, Any is selected. To add more services or service groups, click Multiple. In the pop-up dialog, add more services or service groups. To search services or service groups, enter the keyword in the textbox in the drop-down list and then press Enter key. To create a new service or service group, click New Service or New Group in the drop-down list. For more information, view Configuring a Service Book.
  • Application Book: Specify the application of the traffic. By default, Any is selected. To add more applications or application groups, Click Multiple. To search applications or application groups, enter the keyword in the textbox in the drop-down list and then press Enter key. To create a new application group, click New Application Group in the drop-down list. For more information, view Configuring an Application Book.
  • Schedule: Specifies the schedule of the traffic. To search schedules, enter the keyword in the textbox in the drop-down list and then press Enter key. To create a new schedule, click New Schedule in the drop-down list. To add more schedules, click Multiple. For more information, view Configuring a Schedule.
Action

Specifies the action for the traffic that matches the security policy:

  • Permit: Select Permit to permit the traffic to pass through the device.
  • Deny: Select Deny to deny the traffic.
  • Security Connection: Perform the Web authentication action to the traffic. Select WebAuth from the Security Connection drop-down list, and then select an authentication server from the following drop-down list.
Advanced

Description

Enter the description for the security policy.

Record Log

You can log policy matching status for the following situations: the traffic that is matched to security policies starts and ends its session; traffic that is matched to security policies is denied.

Position

When the traffic flows into a Hillstone device, the device will query for security policies by turn and processes the traffic according to the first matched rule. The top security policies in the UI are the first priority to be queried for and the bottom ones are the last priority.

By default, newly-created security policy will be located at the bottom of the policy list in the UI. You can adjust the position of the security policy to the top, to the bottom, or between other security policies.

Protection Configuration

Configure the threat protection methods. For more information, view Configuring Threat Configuration.