Help Center User GuideGetting StartedFAQRelease Notes
 
X
User Guide
Getting Started
FAQ
Release Notes
Contents  

Creating Advanced Policy-Based Routing Rules

Use this page to configure rules for an advanced policy-based routing (APBR) profile (also known as an application profile). You can then associate the rules with one or more than one applications (example: for HTTP) or application groups.

Procedure

To create a rule:

  1. Select Configure > Application Routing Policies.

    The Application Routing Policies page appears.

  2. Click the policy name or rules.

    The Rules page appear.

  3. Click the add icon (+).
  4. Complete the configuration according to the guidelines provided in Table 250.
  5. Click Save.

    The rules you configured are associated with the selected policy.

Table 250: Fields on the Rule Page

Fields

Description

Source

Click the add icon (+) to select a source zone from the list.

You can select one or more zones for the application profile.

Application

Click the add icon (+) to select the application from the list.

If the application matches any of the application or application groups of a rule in a profile, the application profile rule is considered as a match.

You can select one or more applications.

Routing Instance

Click the + icon to select a routing instance from the list, that are configured on a device. The device sends the matched packet to the specified routing instance. The routing instances specify the routing table and the destination to which a packet is forwarded.

When traffic arrives at the specified zone, it is matched by the advanced application profile. The application profile matches applications and application groups and if the matching rule is found, the packets are routed to the routing instance that sends the traffic to a different interface as specified in the next-hop IP address.

Rule Name

The rule name is automatically generated by Security Director. For example, Rule-incremental value.

Note An APBR policy designed in Security Director is equal to one or more policies on a device, based on the unique security zones and rule set.

Related Documentation

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit