Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Configuring Traffic Filter Rules

Traffic filter rules can be configured on a device to enforce validation against protocols attributes and direct traffic accordingly to the configured attributes. These rules are based on zones on which network interfaces are bound.

The following procedure describes how to configure traffic filter rules to direct FTP traffic from source trustZone to destination untrustZone and from source network trustLan to destination network untrustLan. Here, traffic is traversing from the devices interface A on trustZone to interface B on untrustZone.

  1. Configure a zone and its interfaces.
  2. Configure the security policy in the specified zone-to-zone direction and specify the match criteria.
  3. Configure the security policy in the specified zone-to-zone direction and specify the action to take when a packet matches a criteria.
Note:

Here, trustZone and untrustZone are preconfigured security zones and trustLan and untrustLan are preconfigured network addresses.