1. Threat Response
2. LAN Source = * Destination = Internal IP Subnet
3. DMZ Source -= * Destination = DMZ IP Subnet
4. Ignore Broadcast
5. Internet Source = * Destination = ! Internal IP Subnet
When I test hacks aimed at the DMZ, CTR downgrades and reports the zone as Internet. This IP range is defined in the DMZ and is listed before the Internet zone.
The only way it would not list DMZ addresses as "internet" was to list the Internet Zone ast !Internal-DMZ
If CTR reads security zones from top to bottom, why do I need to include the !DMZ IP Subnet in the Internet zone?