SonicOS 7 Rules and Policies
- SonicOS 7 Rules and Policies
- Access Rules
- Setting Firewall Access Rules
- About Stateful Packet Inspection Default Access Rules
- About Connection Limiting
- Using Bandwidth Management with Access Rules
- Configuring Access Rules
- Enabling and Disabling Access Rules
- Editing Access Rules
- Deleting Access Rules
- Restoring Access Rules to Default Settings
- Displaying Access Rule Traffic Statistics
- Access Rule Configuration Examples
- Setting Firewall Access Rules
- NAT Rules
- About NAT in SonicOS
- About NAT Load Balancing
- About NAT64
- About FQDN-based NAT
- About Source MAC Address Override
- Viewing NAT Policy Entries
- Adding or Editing NAT or NAT64 Policies
- Deleting NAT Policies
- Creating NAT Rule Policies: Examples
- Creating a One-to-One NAT Policy for Inbound Traffic
- Creating a One-to-One NAT Policy for Outbound Traffic
- Inbound Port Address Translation via One-to-One NAT Policy
- Inbound Port Address Translation via WAN IP Address
- Creating a Many-to-One NAT Policy
- Creating a Many-to-Many NAT Policy
- Creating a One-to-Many NAT Load Balancing Policy
- Creating a NAT Load Balancing Policy for Two Web Servers
- Creating a WAN-to-WAN Access Rule for a NAT64 Policy
- DNS Doctoring
- Routing Rules
- Content Filter Rules
- App Rules
- About App Rules
- Rules and Policies > App Rules
- Verifying App Rules Configuration
- App Rules Use Cases
- Creating a Regular Expression in a Match Object
- Policy-based Application Rules
- Logging Application Signature-based Policies
- Compliance Enforcement
- Server Protection
- Hosted Email Environments
- Email Control
- Web Browser Control
- HTTP Post Control
- Forbidden File Type Control
- ActiveX Control
- FTP Control
- Bandwidth Management
- Bypass DPI
- Custom Signature
- Reverse Shell Exploit Prevention
- Endpoint Rules
- SonicWall Support
About the Content Filter Rule Table
Name | Name of the Content Filter policy. |
---|---|
Source Zone | Source zone for the Content Filter policy. |
Destination Zone | Destination zone for the Content Filter policy. |
Source Address Included | Source address object/group included for the Content Filter policy. |
Source Address Excluded | Source address object/group excluded from the Content Filter policy. |
User/Group Included | User or group to which the Content Filter policy applies. |
User/Group Excluded | User or group excluded from the Content Filter policy. |
Schedule | Time that the Content Filter policy is in effect. |
Profile |
CFS profile object used by the Content Filter policy. Mousing over the CFS profile object name displays the particulars of the CFS profile:
|
Action |
CFS action object used by the Content Filter policy. Mousing over the CFS action object name displays the particulars of the CFS action:
|
Priority |
Clicking the Priority for a Content Filter policy displays the Change CFS Policy Priority pop-up menu:
The priority of the Content Filter policy is displayed after From. You can change the priority by entering a number in the To field. The highest priority is 1; 0 is the lowest priority. |
Enabled | To enable the Content Filter policy, select the Enabled checkbox. The default policy, CFS Default Policy, is enabled by default. |
Configure |
Displays these icons for each policy:
|
Was This Article Helpful?
Help us to improve our support portal