Help Center User GuideGetting StartedFAQRelease Notes
User Guide
Getting Started
Release Notes

Creating Advanced Policy-Based Routing Rules

Use this page to configure rules for an advanced policy-based routing (APBR) profile (also known as an application profile). You can then associate the rules with one or more than one applications (example: for HTTP) or application groups.


To create a rule:

  1. Select Configure > Application Routing Policies.

    The Application Routing Policies page appears.

  2. Click the policy name or rules.

    The Rules page appear.

  3. Click the add icon (+).
  4. Complete the configuration according to the guidelines provided in Table 233.
  5. Click Save.

    The rules you configured are associated with the selected policy.

Table 233: Fields on the Rule Page




Click the add icon (+) to select a source zone from the list.

You can select one or more zones for the application profile.


Click the add icon (+) to select the application from the list.

If the application matches any of the application or application groups of a rule in a profile, the application profile rule is considered as a match.

You can select one or more applications.

Routing Instance

Click the + icon to select a routing instance from the list, that are configured on a device. The device sends the matched packet to the specified routing instance. The routing instances specify the routing table and the destination to which a packet is forwarded.

When traffic arrives at the specified zone, it is matched by the advanced application profile. The application profile matches applications and application groups and if the matching rule is found, the packets are routed to the routing instance that sends the traffic to a different interface as specified in the next-hop IP address.

Rule Name

The rule name is automatically generated by Security Director. For example, Rule-incremental value.

Note An APBR policy designed in Security Director is equal to one or more policies on a device, based on the unique security zones and rule set.

Related Documentation

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      

Additional Comments

800 characters remaining

May we contact you if necessary?


Need product assistance? Contact Juniper Support