Introduction to Security Policy

A security policy can control the traffic forwarding between security zones/segments. By default, the devices will deny all traffic between security zones/segments.

A security policy controls the traffic forwarding by relying on the filtering conditions. You can set the filtering conditions by specifying the traffic's source zone/address, destination zone/address, service, application, user, time, etc. For the traffic that meet the filtering conditions, you can permit the traffic, deny the traffic, or use the Web authentication.

When the traffic passes through the device, the system will explore whether the traffic matches the existing security policies. The top security policies in the UI are the first priority to be explored and the bottom ones are the last priority. The policy ID will not determine the priority. Once the system finds the traffic that matches a particular security policy, this security policy will take effect. If the traffic does not match any security device, the traffic will be denied.