Querying policies by ip address, Interzone policy configuration examples, Network requirements – H3C Technologies H3C SecPath F1000-E User Manual
Page 601
9
Item Description
Start Time
Start time of the statistics.
End Time
End time of the statistics.
Interzone policy configuration task list
Querying Policies by IP Address
Select Firewall > Security Policy > Policy Inverse Query from the navigation tree to enter the
page as shown in
. Type the IP address in the text box, choose whether you want to query by
source or destination IP address from the drop-down list, and then click Search. The page displays the
policies with the source or destination IP address
Figure 10 Query policies by IP address
NOTE:
Clicking the Configure Interzone Policy link goes to the interzone policy rule list page. You can also select
Firewall > Security Policy > Interzone Policy from the navigation tree to enter the page.
Interzone policy configuration task list
Interzone Policy Configuration Examples
Network requirements
•
As shown in
, Device connects the corporate network to the Internet. The corporate
network belongs to zone Trust, while the external network belongs to zone Untrust.
•
Configure an interzone policy, allowing internal host Public to access the external network at any
time and denying all the other internal hosts’ access to the external network during working hours
(from 8:00 to 18:00) on working days (from Monday through Friday).