Figure 57 MPLS log auditing

NOTE:

If the IP address/port number is null in the database, NA will be displayed in the IP address or port field.

Security policy management

This function allows you to configure security policies for the firewall devices, so that the devices can automatically identify and filter network traffic that travel through the devices. More specifically, this function allows you to configure a series of rules to match packets between a source security zone and a destination security zone, and permit or drop the matched packets.

Security zones

Configuration guide

From the navigation tree of the firewall management component, select Security Zones under Security Policy Management to enter the security zone management page, as shown in Figure 58. Table 61 describes the security zone management functions available on the page.

Figure 58 Security zone management page

Table 61 Security zone management functions

Function

Description

Security zone list

Allows you to view the detailed information of all security zones.

 

 

56