[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

from-zone (Security Policies)

Syntax

from-zone zone-name to-zone zone-name {
policy policy-name {
match {
application [ application-name-or-set ];
destination-address {
address-name ;
}
source-address {
address-name ;
}
}
scheduler-name scheduler-name ;
then {
count {
alarm {
per-minute-threshold number;
per-second-threshold number ;
}
}
(deny | reject);
permit {
application-services (wx-redirect | wx-reverse-redirect);
destination-address {
drop-translated;
drop-untranslated;
}
firewall-authentication {
pass-through {
access-profile profile-name ;
client-match match-name ;
web-redirect;
}
web-authentication {
client-match user-or-group ;
}
}
tunnel {
ipsec-vpn vpn-name ;
pair-policy pair-policy ;
}
}
log {
session-close;
session-init;
}
}
}
}

Hierarchy Level

[edit security policies]

Release Information

Statement introduced in Release 8.5 of JUNOS Software.

Description

Specify a source zone and destination zone to be associated with the security policy.

Options

zone-name —Name of the source zone.

to-zone zone-name —Name of the destination zone.

The remaining statements are explained separately.

Usage Guidelines

For configuration instructions and examples, see the JUNOS Software Security Configuration Guide.

Required Privilege Level

security—To view this statement in the configuration.

security-control—To add this statement to the configuration.


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]