ON THIS PAGE
Summary of Security Policy Response Tags
<address-table>
Usage
<security-dns-cache> <dns-cache> <dns-address> <address-table> <address-entry> address-entry </address-entry> </address-table> </dns-address> </dns-cache> </security-dns-cache>
Description
DNS address table
<alarm>
Usage
<policy-count-alarms> <alarm> <alarm-count> alarm-count </alarm-count> <alarm-type> alarm-type </alarm-type> </alarm> </policy-count-alarms>
Description
Information about a single alarm
<alarm>
Usage
<policy-information> <policy-count-alarms> <alarm> <alarm-count> alarm-count </alarm-count> <alarm-type> alarm-type </alarm-type> </alarm> </policy-count-alarms> </policy-information>
Description
Information about a single alarm
<alarm>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-count-alarms> <alarm> <alarm-count> alarm-count </alarm-count> <alarm-type> alarm-type </alarm-type> </alarm> </policy-count-alarms> </policy-information> </policies> </security-context> </security-policies>
Description
Information about a single alarm
<alarm>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-count-alarms> <alarm> <alarm-count> alarm-count </alarm-count> <alarm-type> alarm-type </alarm-type> </alarm> </policy-count-alarms> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about a single alarm
<alarm>
Usage
<security-policy-match> <policy-information> <policy-count-alarms> <alarm> <alarm-count> alarm-count </alarm-count> <alarm-type> alarm-type </alarm-type> </alarm> </policy-count-alarms> </policy-information> </security-policy-match>
Description
Information about a single alarm
<application>
Usage
<applications> <application> <application-name> application-name </application-name> <application-term>....</application-term> </application> </applications>
Description
Information about an application in the policy
<application>
Usage
<policy-information> <applications> <application> <application-name> application-name </application-name> <application-term>....</application-term> </application> </applications> </policy-information>
Description
Information about an application in the policy
<application>
Usage
<security-policies> <security-context> <policies> <policy-information> <applications> <application> <application-name> application-name </application-name> <application-term>....</application-term> </application> </applications> </policy-information> </policies> </security-context> </security-policies>
Description
Information about an application in the policy
<application>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <applications> <application> <application-name> application-name </application-name> <application-term>....</application-term> </application> </applications> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about an application in the policy
<application>
Usage
<security-policy-match> <policy-information> <applications> <application> <application-name> application-name </application-name> <application-term>....</application-term> </application> </applications> </policy-information> </security-policy-match>
Description
Information about an application in the policy
<application-acceleration>
Usage
<policy-application-services> <application-acceleration> <application-acceleration-profile-name> application-acceleration-profile-name </application-acceleration-profile-name> <application-acceleration-service-options> application-acceleration-service-options </application-acceleration-service-options> </application-acceleration> </policy-application-services>
Description
Information of the application acceleration
<application-acceleration>
Usage
<policy-information> <policy-application-services> <application-acceleration> <application-acceleration-profile-name> application-acceleration-profile-name </application-acceleration-profile-name> <application-acceleration-service-options> application-acceleration-service-options </application-acceleration-service-options> </application-acceleration> </policy-application-services> </policy-information>
Description
Information of the application acceleration
<application-acceleration>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-acceleration> <application-acceleration-profile-name> application-acceleration-profile-name </application-acceleration-profile-name> <application-acceleration-service-options> application-acceleration-service-options </application-acceleration-service-options> </application-acceleration> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of the application acceleration
<application-acceleration>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-acceleration> <application-acceleration-profile-name> application-acceleration-profile-name </application-acceleration-profile-name> <application-acceleration-service-options> application-acceleration-service-options </application-acceleration-service-options> </application-acceleration> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of the application acceleration
<application-acceleration>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-acceleration> <application-acceleration-profile-name> application-acceleration-profile-name </application-acceleration-profile-name> <application-acceleration-service-options> application-acceleration-service-options </application-acceleration-service-options> </application-acceleration> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of the application acceleration
<application-firewall>
Usage
<policy-application-services> <application-firewall> <rule-set-info>....</rule-set-info> </application-firewall> </policy-application-services>
Description
Information of the application firewall
<application-firewall>
Usage
<policy-information> <policy-application-services> <application-firewall> <rule-set-info>....</rule-set-info> </application-firewall> </policy-application-services> </policy-information>
Description
Information of the application firewall
<application-firewall>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info>....</rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of the application firewall
<application-firewall>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info>....</rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of the application firewall
<application-firewall>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-firewall> <rule-set-info>....</rule-set-info> </application-firewall> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of the application firewall
<application-term>
Usage
<applications> <application> <application-term> <protocol> protocol </protocol> <alg-name> alg-name </alg-name> <inactivity-timeout> inactivity-timeout </inactivity-timeout> <source-port-range>....</source-port-range> <destination-port-range>....</destination-port-range> <icmp-info>....</icmp-info> <rpc-information>....</rpc-information> </application-term> </application> </applications>
Description
Information about a term within an application
<application-term>
Usage
<policy-information> <applications> <application> <application-term> <protocol> protocol </protocol> <alg-name> alg-name </alg-name> <inactivity-timeout> inactivity-timeout </inactivity-timeout> <source-port-range>....</source-port-range> <destination-port-range>....</destination-port-range> <icmp-info>....</icmp-info> <rpc-information>....</rpc-information> </application-term> </application> </applications> </policy-information>
Description
Information about a term within an application
<application-term>
Usage
<security-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <protocol> protocol </protocol> <alg-name> alg-name </alg-name> <inactivity-timeout> inactivity-timeout </inactivity-timeout> <source-port-range>....</source-port-range> <destination-port-range>....</destination-port-range> <icmp-info>....</icmp-info> <rpc-information>....</rpc-information> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-policies>
Description
Information about a term within an application
<application-term>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <protocol> protocol </protocol> <alg-name> alg-name </alg-name> <inactivity-timeout> inactivity-timeout </inactivity-timeout> <source-port-range>....</source-port-range> <destination-port-range>....</destination-port-range> <icmp-info>....</icmp-info> <rpc-information>....</rpc-information> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about a term within an application
<application-term>
Usage
<security-policy-match> <policy-information> <applications> <application> <application-term> <protocol> protocol </protocol> <alg-name> alg-name </alg-name> <inactivity-timeout> inactivity-timeout </inactivity-timeout> <source-port-range>....</source-port-range> <destination-port-range>....</destination-port-range> <icmp-info>....</icmp-info> <rpc-information>....</rpc-information> </application-term> </application> </applications> </policy-information> </security-policy-match>
Description
Information about a term within an application
<application-traffic-control>
Usage
<policy-application-services> <application-traffic-control> <rule-set-name> rule-set-name </rule-set-name> </application-traffic-control> </policy-application-services>
Description
Information of the application traffic control
<application-traffic-control>
Usage
<policy-information> <policy-application-services> <application-traffic-control> <rule-set-name> rule-set-name </rule-set-name> </application-traffic-control> </policy-application-services> </policy-information>
Description
Information of the application traffic control
<application-traffic-control>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-traffic-control> <rule-set-name> rule-set-name </rule-set-name> </application-traffic-control> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of the application traffic control
<application-traffic-control>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-traffic-control> <rule-set-name> rule-set-name </rule-set-name> </application-traffic-control> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of the application traffic control
<application-traffic-control>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-traffic-control> <rule-set-name> rule-set-name </rule-set-name> </application-traffic-control> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of the application traffic control
<applications>
Usage
<applications> <application>....</application> </applications>
Description
<applications>
Usage
<policy-information> <applications> <application>....</application> </applications> </policy-information>
Description
<applications>
Usage
<security-policies> <security-context> <policies> <policy-information> <applications> <application>....</application> </applications> </policy-information> </policies> </security-context> </security-policies>
Description
<applications>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <applications> <application>....</application> </applications> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
<applications>
Usage
<security-policy-match> <policy-information> <applications> <application>....</application> </applications> </policy-information> </security-policy-match>
Description
<context-information>
Usage
<context-information> <global-context> global-context </global-context> <source-zone-name> source-zone-name </source-zone-name> <destination-zone-name> destination-zone-name </destination-zone-name> </context-information>
Description
Information about the logical system, source zone, and destination zone for a policy
<context-information>
Usage
<policy-information> <context-information> <global-context> global-context </global-context> <source-zone-name> source-zone-name </source-zone-name> <destination-zone-name> destination-zone-name </destination-zone-name> </context-information> </policy-information>
Description
Information about the logical system, source zone, and destination zone for a policy
<context-information>
Usage
<security-policies> <security-context> <context-information> <global-context> global-context </global-context> <source-zone-name> source-zone-name </source-zone-name> <destination-zone-name> destination-zone-name </destination-zone-name> </context-information> </security-context> </security-policies>
Description
Information about the logical system, source zone, and destination zone for a policy
<context-information>
Usage
<security-policies> <security-context> <policies> <policy-information> <context-information> <global-context> global-context </global-context> <source-zone-name> source-zone-name </source-zone-name> <destination-zone-name> destination-zone-name </destination-zone-name> </context-information> </policy-information> </policies> </security-context> </security-policies>
Description
Information about the logical system, source zone, and destination zone for a policy
<context-information>
Usage
<security-dynamic-policies> <security-context> <context-information> <global-context> global-context </global-context> <source-zone-name> source-zone-name </source-zone-name> <destination-zone-name> destination-zone-name </destination-zone-name> </context-information> </security-context> </security-dynamic-policies>
Description
Information about the logical system, source zone, and destination zone for a policy
<context-information>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <context-information> <global-context> global-context </global-context> <source-zone-name> source-zone-name </source-zone-name> <destination-zone-name> destination-zone-name </destination-zone-name> </context-information> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about the logical system, source zone, and destination zone for a policy
<context-information>
Usage
<security-policy-match> <policy-information> <context-information> <global-context> global-context </global-context> <source-zone-name> source-zone-name </source-zone-name> <destination-zone-name> destination-zone-name </destination-zone-name> </context-information> </policy-information> </security-policy-match>
Description
Information about the logical system, source zone, and destination zone for a policy
<default-rule>
Usage
<policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <default-rule> <action> action </action> </default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services>
Description
Information of the default rule
<default-rule>
Usage
<policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <default-rule> <action> action </action> </default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information>
Description
Information of the default rule
<default-rule>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <default-rule> <action> action </action> </default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of the default rule
<default-rule>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <default-rule> <action> action </action> </default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of the default rule
<default-rule>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <default-rule> <action> action </action> </default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of the default rule
<destination-address>
Usage
<destination-addresses> <destination-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </destination-address> </destination-addresses>
Description
Information about a destination address
<destination-address>
Usage
<policy-information> <destination-addresses> <destination-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </destination-address> </destination-addresses> </policy-information>
Description
Information about a destination address
<destination-address>
Usage
<security-policies> <security-context> <policies> <policy-information> <destination-addresses> <destination-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </destination-address> </destination-addresses> </policy-information> </policies> </security-context> </security-policies>
Description
Information about a destination address
<destination-address>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <destination-addresses> <destination-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </destination-address> </destination-addresses> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about a destination address
<destination-address>
Usage
<security-policy-match> <policy-information> <destination-addresses> <destination-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </destination-address> </destination-addresses> </policy-information> </security-policy-match>
Description
Information about a destination address
<destination-addresses>
Usage
<destination-addresses> <destination-address>....</destination-address> </destination-addresses>
Description
Information about the destination addresses
<destination-addresses>
Usage
<policy-information> <destination-addresses> <destination-address>....</destination-address> </destination-addresses> </policy-information>
Description
Information about the destination addresses
<destination-addresses>
Usage
<security-policies> <security-context> <policies> <policy-information> <destination-addresses> <destination-address>....</destination-address> </destination-addresses> </policy-information> </policies> </security-context> </security-policies>
Description
Information about the destination addresses
<destination-addresses>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <destination-addresses> <destination-address>....</destination-address> </destination-addresses> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about the destination addresses
<destination-addresses>
Usage
<security-policy-match> <policy-information> <destination-addresses> <destination-address>....</destination-address> </destination-addresses> </policy-information> </security-policy-match>
Description
Information about the destination addresses
<destination-port-range>
Usage
<applications> <application> <application-term> <destination-port-range> <low> low </low> <high> high </high> </destination-port-range> </application-term> </application> </applications>
Description
Range of the destination ports
<destination-port-range>
Usage
<policy-information> <applications> <application> <application-term> <destination-port-range> <low> low </low> <high> high </high> </destination-port-range> </application-term> </application> </applications> </policy-information>
Description
Range of the destination ports
<destination-port-range>
Usage
<security-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <destination-port-range> <low> low </low> <high> high </high> </destination-port-range> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-policies>
Description
Range of the destination ports
<destination-port-range>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <destination-port-range> <low> low </low> <high> high </high> </destination-port-range> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Range of the destination ports
<destination-port-range>
Usage
<security-policy-match> <policy-information> <applications> <application> <application-term> <destination-port-range> <low> low </low> <high> high </high> </destination-port-range> </application-term> </application> </applications> </policy-information> </security-policy-match>
Description
Range of the destination ports
<dns-address>
Usage
<security-dns-cache> <dns-cache> <dns-address> <address-family> address-family </address-family> <address-ttl> address-ttl </address-ttl> <address-table>....</address-table> </dns-address> </dns-cache> </security-dns-cache>
Description
DNS address
<dns-cache>
Usage
<security-dns-cache> <dns-cache> <dns-name> dns-name </dns-name> <dns-address>....</dns-address> </dns-cache> </security-dns-cache>
Description
DNS cache of a DNS name
<dynamic-application-group-list>
Usage
<dynamic-application-group-list> <dynamic-application-group> dynamic-application-group </dynamic-application-group> </dynamic-application-group-list>
Description
Information of all dynamic application group
<dynamic-application-group-list>
Usage
<policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-group-list> <dynamic-application-group> dynamic-application-group </dynamic-application-group> </dynamic-application-group-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services>
Description
Information of all dynamic application group
<dynamic-application-group-list>
Usage
<policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-group-list> <dynamic-application-group> dynamic-application-group </dynamic-application-group> </dynamic-application-group-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information>
Description
Information of all dynamic application group
<dynamic-application-group-list>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-group-list> <dynamic-application-group> dynamic-application-group </dynamic-application-group> </dynamic-application-group-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of all dynamic application group
<dynamic-application-group-list>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-group-list> <dynamic-application-group> dynamic-application-group </dynamic-application-group> </dynamic-application-group-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of all dynamic application group
<dynamic-application-group-list>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-group-list> <dynamic-application-group> dynamic-application-group </dynamic-application-group> </dynamic-application-group-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of all dynamic application group
<dynamic-application-list>
Usage
<dynamic-application-list> <dynamic-application> dynamic-application </dynamic-application> </dynamic-application-list>
Description
Information of all dynamic application
<dynamic-application-list>
Usage
<policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-list> <dynamic-application> dynamic-application </dynamic-application> </dynamic-application-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services>
Description
Information of all dynamic application
<dynamic-application-list>
Usage
<policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-list> <dynamic-application> dynamic-application </dynamic-application> </dynamic-application-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information>
Description
Information of all dynamic application
<dynamic-application-list>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-list> <dynamic-application> dynamic-application </dynamic-application> </dynamic-application-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of all dynamic application
<dynamic-application-list>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-list> <dynamic-application> dynamic-application </dynamic-application> </dynamic-application-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of all dynamic application
<dynamic-application-list>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <dynamic-application-list> <dynamic-application> dynamic-application </dynamic-application> </dynamic-application-list> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of all dynamic application
<icmp-info>
Usage
<applications> <application> <application-term> <icmp-info> <icmp-type> icmp-type </icmp-type> <icmp-code> icmp-code </icmp-code> </icmp-info> </application-term> </application> </applications>
Description
ICMP type information
<icmp-info>
Usage
<policy-information> <applications> <application> <application-term> <icmp-info> <icmp-type> icmp-type </icmp-type> <icmp-code> icmp-code </icmp-code> </icmp-info> </application-term> </application> </applications> </policy-information>
Description
ICMP type information
<icmp-info>
Usage
<security-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <icmp-info> <icmp-type> icmp-type </icmp-type> <icmp-code> icmp-code </icmp-code> </icmp-info> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-policies>
Description
ICMP type information
<icmp-info>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <icmp-info> <icmp-type> icmp-type </icmp-type> <icmp-code> icmp-code </icmp-code> </icmp-info> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
ICMP type information
<icmp-info>
Usage
<security-policy-match> <policy-information> <applications> <application> <application-term> <icmp-info> <icmp-type> icmp-type </icmp-type> <icmp-code> icmp-code </icmp-code> </icmp-info> </application-term> </application> </applications> </policy-information> </security-policy-match>
Description
ICMP type information
<policies>
Usage
<security-policies> <security-context> <policies> <policy-information>....</policy-information> </policies> </security-context> </security-policies>
Description
<policies>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information>....</policy-information> </policies> </security-context> </security-dynamic-policies>
Description
<policy-action>
Usage
<policy-action> <action-type> action-type </action-type> <tunnel> tunnel </tunnel> <nat-source> nat-source </nat-source> <nat-destination> nat-destination </nat-destination> <firewall-authentication> firewall-authentication </firewall-authentication> <services-offload> services-offload </services-offload> <application-services> application-services </application-services> <uac-enabled> uac-enabled </uac-enabled> <log> log </log> <count> count </count> <scheduled> scheduled </scheduled> </policy-action>
Description
Action specified in the policy
<policy-action>
Usage
<policy-information> <policy-action> <action-type> action-type </action-type> <tunnel> tunnel </tunnel> <nat-source> nat-source </nat-source> <nat-destination> nat-destination </nat-destination> <firewall-authentication> firewall-authentication </firewall-authentication> <services-offload> services-offload </services-offload> <application-services> application-services </application-services> <uac-enabled> uac-enabled </uac-enabled> <log> log </log> <count> count </count> <scheduled> scheduled </scheduled> </policy-action> </policy-information>
Description
Action specified in the policy
<policy-action>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-action> <action-type> action-type </action-type> <tunnel> tunnel </tunnel> <nat-source> nat-source </nat-source> <nat-destination> nat-destination </nat-destination> <firewall-authentication> firewall-authentication </firewall-authentication> <services-offload> services-offload </services-offload> <application-services> application-services </application-services> <uac-enabled> uac-enabled </uac-enabled> <log> log </log> <count> count </count> <scheduled> scheduled </scheduled> </policy-action> </policy-information> </policies> </security-context> </security-policies>
Description
Action specified in the policy
<policy-action>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-action> <action-type> action-type </action-type> <tunnel> tunnel </tunnel> <nat-source> nat-source </nat-source> <nat-destination> nat-destination </nat-destination> <firewall-authentication> firewall-authentication </firewall-authentication> <services-offload> services-offload </services-offload> <application-services> application-services </application-services> <uac-enabled> uac-enabled </uac-enabled> <log> log </log> <count> count </count> <scheduled> scheduled </scheduled> </policy-action> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Action specified in the policy
<policy-action>
Usage
<security-policy-match> <policy-information> <policy-action> <action-type> action-type </action-type> <tunnel> tunnel </tunnel> <nat-source> nat-source </nat-source> <nat-destination> nat-destination </nat-destination> <firewall-authentication> firewall-authentication </firewall-authentication> <services-offload> services-offload </services-offload> <application-services> application-services </application-services> <uac-enabled> uac-enabled </uac-enabled> <log> log </log> <count> count </count> <scheduled> scheduled </scheduled> </policy-action> </policy-information> </security-policy-match>
Description
Action specified in the policy
<policy-application-services>
Usage
<policy-application-services> <gprs-gtp-profile> gprs-gtp-profile </gprs-gtp-profile> <gprs-sctp-profile> gprs-sctp-profile </gprs-sctp-profile> <idp> idp </idp> <uac-policy> uac-policy </uac-policy> <application-firewall>....</application-firewall> <application-acceleration>....</application-acceleration> <ssl-initiation>....</ssl-initiation> <ssl-termination>....</ssl-termination> <ssl-proxy>....</ssl-proxy> <application-traffic-control>....</application-traffic-control> <utm> utm </utm> <wan-acceleration> wan-acceleration </wan-acceleration> <wx-optimizer>....</wx-optimizer> </policy-application-services>
Description
Application services
<policy-application-services>
Usage
<policy-information> <policy-application-services> <gprs-gtp-profile> gprs-gtp-profile </gprs-gtp-profile> <gprs-sctp-profile> gprs-sctp-profile </gprs-sctp-profile> <idp> idp </idp> <uac-policy> uac-policy </uac-policy> <application-firewall>....</application-firewall> <application-acceleration>....</application-acceleration> <ssl-initiation>....</ssl-initiation> <ssl-termination>....</ssl-termination> <ssl-proxy>....</ssl-proxy> <application-traffic-control>....</application-traffic-control> <utm> utm </utm> <wan-acceleration> wan-acceleration </wan-acceleration> <wx-optimizer>....</wx-optimizer> </policy-application-services> </policy-information>
Description
Application services
<policy-application-services>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <gprs-gtp-profile> gprs-gtp-profile </gprs-gtp-profile> <gprs-sctp-profile> gprs-sctp-profile </gprs-sctp-profile> <idp> idp </idp> <uac-policy> uac-policy </uac-policy> <application-firewall>....</application-firewall> <application-acceleration>....</application-acceleration> <ssl-initiation>....</ssl-initiation> <ssl-termination>....</ssl-termination> <ssl-proxy>....</ssl-proxy> <application-traffic-control>....</application-traffic-control> <utm> utm </utm> <wan-acceleration> wan-acceleration </wan-acceleration> <wx-optimizer>....</wx-optimizer> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Application services
<policy-application-services>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <gprs-gtp-profile> gprs-gtp-profile </gprs-gtp-profile> <gprs-sctp-profile> gprs-sctp-profile </gprs-sctp-profile> <idp> idp </idp> <uac-policy> uac-policy </uac-policy> <application-firewall>....</application-firewall> <application-acceleration>....</application-acceleration> <ssl-initiation>....</ssl-initiation> <ssl-termination>....</ssl-termination> <ssl-proxy>....</ssl-proxy> <application-traffic-control>....</application-traffic-control> <utm> utm </utm> <wan-acceleration> wan-acceleration </wan-acceleration> <wx-optimizer>....</wx-optimizer> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Application services
<policy-application-services>
Usage
<security-policy-match> <policy-information> <policy-application-services> <gprs-gtp-profile> gprs-gtp-profile </gprs-gtp-profile> <gprs-sctp-profile> gprs-sctp-profile </gprs-sctp-profile> <idp> idp </idp> <uac-policy> uac-policy </uac-policy> <application-firewall>....</application-firewall> <application-acceleration>....</application-acceleration> <ssl-initiation>....</ssl-initiation> <ssl-termination>....</ssl-termination> <ssl-proxy>....</ssl-proxy> <application-traffic-control>....</application-traffic-control> <utm> utm </utm> <wan-acceleration> wan-acceleration </wan-acceleration> <wx-optimizer>....</wx-optimizer> </policy-application-services> </policy-information> </security-policy-match>
Description
Application services
<policy-context-checksum-entry>
Usage
<policy-context-checksum-info> <policy-context-checksum-entry> <source-zone-name> source-zone-name </source-zone-name> <destination-zone-name> destination-zone-name </destination-zone-name> <context-checksum> context-checksum </context-checksum> </policy-context-checksum-entry> </policy-context-checksum-info>
Description
Information about a context
<policy-context-checksum-entry>
Usage
<security-policies> <policy-context-checksum-info> <policy-context-checksum-entry> <source-zone-name> source-zone-name </source-zone-name> <destination-zone-name> destination-zone-name </destination-zone-name> <context-checksum> context-checksum </context-checksum> </policy-context-checksum-entry> </policy-context-checksum-info> </security-policies>
Description
Information about a context
<policy-context-checksum-info>
Usage
<policy-context-checksum-info> <logical-system-name> logical-system-name </logical-system-name> <policy-context-checksum-entry>....</policy-context-checksum-entry> </policy-context-checksum-info>
Description
Show policy checksum
<policy-context-checksum-info>
Usage
<security-policies> <policy-context-checksum-info> <logical-system-name> logical-system-name </logical-system-name> <policy-context-checksum-entry>....</policy-context-checksum-entry> </policy-context-checksum-info> </security-policies>
Description
Show policy checksum
<policy-count-alarms>
Usage
<policy-count-alarms> <alarm>....</alarm> </policy-count-alarms>
Description
Information about alarms for the policy
<policy-count-alarms>
Usage
<policy-information> <policy-count-alarms> <alarm>....</alarm> </policy-count-alarms> </policy-information>
Description
Information about alarms for the policy
<policy-count-alarms>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-count-alarms> <alarm>....</alarm> </policy-count-alarms> </policy-information> </policies> </security-context> </security-policies>
Description
Information about alarms for the policy
<policy-count-alarms>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-count-alarms> <alarm>....</alarm> </policy-count-alarms> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about alarms for the policy
<policy-count-alarms>
Usage
<security-policy-match> <policy-information> <policy-count-alarms> <alarm>....</alarm> </policy-count-alarms> </policy-information> </security-policy-match>
Description
Information about alarms for the policy
<policy-firewall-authentication>
Usage
<policy-firewall-authentication> <authentication-type> authentication-type </authentication-type> <access-profile-name> access-profile-name </access-profile-name> <client-match-name> client-match-name </client-match-name> <web-redirect> web-redirect </web-redirect> </policy-firewall-authentication>
Description
Information about firewall authentication in the policy
<policy-firewall-authentication>
Usage
<policy-information> <policy-firewall-authentication> <authentication-type> authentication-type </authentication-type> <access-profile-name> access-profile-name </access-profile-name> <client-match-name> client-match-name </client-match-name> <web-redirect> web-redirect </web-redirect> </policy-firewall-authentication> </policy-information>
Description
Information about firewall authentication in the policy
<policy-firewall-authentication>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-firewall-authentication> <authentication-type> authentication-type </authentication-type> <access-profile-name> access-profile-name </access-profile-name> <client-match-name> client-match-name </client-match-name> <web-redirect> web-redirect </web-redirect> </policy-firewall-authentication> </policy-information> </policies> </security-context> </security-policies>
Description
Information about firewall authentication in the policy
<policy-firewall-authentication>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-firewall-authentication> <authentication-type> authentication-type </authentication-type> <access-profile-name> access-profile-name </access-profile-name> <client-match-name> client-match-name </client-match-name> <web-redirect> web-redirect </web-redirect> </policy-firewall-authentication> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about firewall authentication in the policy
<policy-firewall-authentication>
Usage
<security-policy-match> <policy-information> <policy-firewall-authentication> <authentication-type> authentication-type </authentication-type> <access-profile-name> access-profile-name </access-profile-name> <client-match-name> client-match-name </client-match-name> <web-redirect> web-redirect </web-redirect> </policy-firewall-authentication> </policy-information> </security-policy-match>
Description
Information about firewall authentication in the policy
<policy-hit-count>
Usage
<policy-hit-count> <logical-system-name> logical-system-name </logical-system-name> <policy-hit-count-num> policy-hit-count-num </policy-hit-count-num> <policy-hit-count-entry>....</policy-hit-count-entry> </policy-hit-count>
Description
Show policy hit-count
<policy-hit-count-entry>
Usage
<policy-hit-count-entry> <policy-hit-count-index> policy-hit-count-index </policy-hit-count-index> <policy-hit-count-from-zone> policy-hit-count-from-zone </policy-hit-count-from-zone> <policy-hit-count-to-zone> policy-hit-count-to-zone </policy-hit-count-to-zone> <policy-hit-count-policy-name> policy-hit-count-policy-name </policy-hit-count-policy-name> <policy-hit-count-count> policy-hit-count-count </policy-hit-count-count> </policy-hit-count-entry>
Description
Information about policy hit-count
<policy-hit-count-entry>
Usage
<policy-hit-count> <policy-hit-count-entry> <policy-hit-count-index> policy-hit-count-index </policy-hit-count-index> <policy-hit-count-from-zone> policy-hit-count-from-zone </policy-hit-count-from-zone> <policy-hit-count-to-zone> policy-hit-count-to-zone </policy-hit-count-to-zone> <policy-hit-count-policy-name> policy-hit-count-policy-name </policy-hit-count-policy-name> <policy-hit-count-count> policy-hit-count-count </policy-hit-count-count> </policy-hit-count-entry> </policy-hit-count>
Description
Information about policy hit-count
<policy-information>
Usage
<policy-information> <policy-name> policy-name </policy-name> <policy-identifier> policy-identifier </policy-identifier> <scope-policy-identifier> scope-policy-identifier </scope-policy-identifier> <policy-sequence-number> policy-sequence-number </policy-sequence-number> <policy-action>....</policy-action> <policy-state> policy-state </policy-state> <context-information>....</context-information> <policy-description> policy-description </policy-description> <policy-type-information>....</policy-type-information> <source-addresses>....</source-addresses> <destination-addresses>....</destination-addresses> <applications>....</applications> <source-identities>....</source-identities> <policy-tcp-options>....</policy-tcp-options> <policy-tunnel>....</policy-tunnel> <policy-firewall-authentication>....</policy-firewall-authentication> <policy-application-services>....</policy-application-services> <policy-count-alarms>....</policy-count-alarms> <policy-log>....</policy-log> <policy-scheduler>....</policy-scheduler> <policy-statistics-information>....</policy-statistics-information> </policy-information>
Description
Information about security policies
<policy-information>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-name> policy-name </policy-name> <policy-identifier> policy-identifier </policy-identifier> <scope-policy-identifier> scope-policy-identifier </scope-policy-identifier> <policy-sequence-number> policy-sequence-number </policy-sequence-number> <policy-action>....</policy-action> <policy-state> policy-state </policy-state> <context-information>....</context-information> <policy-description> policy-description </policy-description> <policy-type-information>....</policy-type-information> <source-addresses>....</source-addresses> <destination-addresses>....</destination-addresses> <applications>....</applications> <source-identities>....</source-identities> <policy-tcp-options>....</policy-tcp-options> <policy-tunnel>....</policy-tunnel> <policy-firewall-authentication>....</policy-firewall-authentication> <policy-application-services>....</policy-application-services> <policy-count-alarms>....</policy-count-alarms> <policy-log>....</policy-log> <policy-scheduler>....</policy-scheduler> <policy-statistics-information>....</policy-statistics-information> </policy-information> </policies> </security-context> </security-policies>
Description
Information about security policies
<policy-information>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-name> policy-name </policy-name> <policy-identifier> policy-identifier </policy-identifier> <scope-policy-identifier> scope-policy-identifier </scope-policy-identifier> <policy-sequence-number> policy-sequence-number </policy-sequence-number> <policy-action>....</policy-action> <policy-state> policy-state </policy-state> <context-information>....</context-information> <policy-description> policy-description </policy-description> <policy-type-information>....</policy-type-information> <source-addresses>....</source-addresses> <destination-addresses>....</destination-addresses> <applications>....</applications> <source-identities>....</source-identities> <policy-tcp-options>....</policy-tcp-options> <policy-tunnel>....</policy-tunnel> <policy-firewall-authentication>....</policy-firewall-authentication> <policy-application-services>....</policy-application-services> <policy-count-alarms>....</policy-count-alarms> <policy-log>....</policy-log> <policy-scheduler>....</policy-scheduler> <policy-statistics-information>....</policy-statistics-information> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about security policies
<policy-information>
Usage
<security-policy-match> <policy-information> <policy-name> policy-name </policy-name> <policy-identifier> policy-identifier </policy-identifier> <scope-policy-identifier> scope-policy-identifier </scope-policy-identifier> <policy-sequence-number> policy-sequence-number </policy-sequence-number> <policy-action>....</policy-action> <policy-state> policy-state </policy-state> <context-information>....</context-information> <policy-description> policy-description </policy-description> <policy-type-information>....</policy-type-information> <source-addresses>....</source-addresses> <destination-addresses>....</destination-addresses> <applications>....</applications> <source-identities>....</source-identities> <policy-tcp-options>....</policy-tcp-options> <policy-tunnel>....</policy-tunnel> <policy-firewall-authentication>....</policy-firewall-authentication> <policy-application-services>....</policy-application-services> <policy-count-alarms>....</policy-count-alarms> <policy-log>....</policy-log> <policy-scheduler>....</policy-scheduler> <policy-statistics-information>....</policy-statistics-information> </policy-information> </security-policy-match>
Description
Information about security policies
<policy-internal-information>
Usage
<policy-internal-information> <current-policies> current-policies </current-policies> <maximum-policies> maximum-policies </maximum-policies> <current-policy-context> current-policy-context </current-policy-context> <maximum-policy-context> maximum-policy-context </maximum-policy-context> <current-policy-per-context> current-policy-per-context </current-policy-per-context> <maximum-policy-per-context> maximum-policy-per-context </maximum-policy-per-context> <current-statistic-counters> current-statistic-counters </current-statistic-counters> <maximum-statistic-counters> maximum-statistic-counters </maximum-statistic-counters> <current-source-address-per-policy> current-source-address-per-policy </current-source-address-per-policy> <maximum-source-address-per-policy> maximum-source-address-per-policy </maximum-source-address-per-policy> <current-destination-address-per-policy> current-destination-address-per-policy </current-destination-address-per-policy> <maximum-destination-address-per-policy> maximum-destination-address-per-policy </maximum-destination-address-per-policy> <current-application-per-policy> current-application-per-policy </current-application-per-policy> <maximum-application-per-policy> maximum-application-per-policy </maximum-application-per-policy> <current-source-identity-per-policy> current-source-identity-per-policy </current-source-identity-per-policy> <maximum-source-identity-per-policy> maximum-source-identity-per-policy </maximum-source-identity-per-policy> <messages-received> messages-received </messages-received> <messages-rejected> messages-rejected </messages-rejected> <add-received> add-received </add-received> <delete-received> delete-received </delete-received> <clear-received> clear-received </clear-received> <invalid-received> invalid-received </invalid-received> <add-pfe> add-pfe </add-pfe> <delete-pfe> delete-pfe </delete-pfe> <clear-pfe> clear-pfe </clear-pfe> <add-success> add-success </add-success> <delete-success> delete-success </delete-success> <clear-success> clear-success </clear-success> <add-failed> add-failed </add-failed> <delete-failed> delete-failed </delete-failed> <clear-failed> clear-failed </clear-failed> <ssam-sent> ssam-sent </ssam-sent> <ssam-success> ssam-success </ssam-success> <ssam-failed> ssam-failed </ssam-failed> <invalid-configuration> invalid-configuration </invalid-configuration> <invalid-scope> invalid-scope </invalid-scope> </policy-internal-information>
Description
Information about the policy
<policy-internal-information>
Usage
<security-policies> <policy-internal-information> <current-policies> current-policies </current-policies> <maximum-policies> maximum-policies </maximum-policies> <current-policy-context> current-policy-context </current-policy-context> <maximum-policy-context> maximum-policy-context </maximum-policy-context> <current-policy-per-context> current-policy-per-context </current-policy-per-context> <maximum-policy-per-context> maximum-policy-per-context </maximum-policy-per-context> <current-statistic-counters> current-statistic-counters </current-statistic-counters> <maximum-statistic-counters> maximum-statistic-counters </maximum-statistic-counters> <current-source-address-per-policy> current-source-address-per-policy </current-source-address-per-policy> <maximum-source-address-per-policy> maximum-source-address-per-policy </maximum-source-address-per-policy> <current-destination-address-per-policy> current-destination-address-per-policy </current-destination-address-per-policy> <maximum-destination-address-per-policy> maximum-destination-address-per-policy </maximum-destination-address-per-policy> <current-application-per-policy> current-application-per-policy </current-application-per-policy> <maximum-application-per-policy> maximum-application-per-policy </maximum-application-per-policy> <current-source-identity-per-policy> current-source-identity-per-policy </current-source-identity-per-policy> <maximum-source-identity-per-policy> maximum-source-identity-per-policy </maximum-source-identity-per-policy> <messages-received> messages-received </messages-received> <messages-rejected> messages-rejected </messages-rejected> <add-received> add-received </add-received> <delete-received> delete-received </delete-received> <clear-received> clear-received </clear-received> <invalid-received> invalid-received </invalid-received> <add-pfe> add-pfe </add-pfe> <delete-pfe> delete-pfe </delete-pfe> <clear-pfe> clear-pfe </clear-pfe> <add-success> add-success </add-success> <delete-success> delete-success </delete-success> <clear-success> clear-success </clear-success> <add-failed> add-failed </add-failed> <delete-failed> delete-failed </delete-failed> <clear-failed> clear-failed </clear-failed> <ssam-sent> ssam-sent </ssam-sent> <ssam-success> ssam-success </ssam-success> <ssam-failed> ssam-failed </ssam-failed> <invalid-configuration> invalid-configuration </invalid-configuration> <invalid-scope> invalid-scope </invalid-scope> </policy-internal-information> </security-policies>
Description
Information about the policy
<policy-log>
Usage
<policy-log> <log-session-creation> log-session-creation </log-session-creation> <log-session-close> log-session-close </log-session-close> </policy-log>
Description
Information about logging for the policy
<policy-log>
Usage
<policy-information> <policy-log> <log-session-creation> log-session-creation </log-session-creation> <log-session-close> log-session-close </log-session-close> </policy-log> </policy-information>
Description
Information about logging for the policy
<policy-log>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-log> <log-session-creation> log-session-creation </log-session-creation> <log-session-close> log-session-close </log-session-close> </policy-log> </policy-information> </policies> </security-context> </security-policies>
Description
Information about logging for the policy
<policy-log>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-log> <log-session-creation> log-session-creation </log-session-creation> <log-session-close> log-session-close </log-session-close> </policy-log> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about logging for the policy
<policy-log>
Usage
<security-policy-match> <policy-information> <policy-log> <log-session-creation> log-session-creation </log-session-creation> <log-session-close> log-session-close </log-session-close> </policy-log> </policy-information> </security-policy-match>
Description
Information about logging for the policy
<policy-scheduler>
Usage
<policy-scheduler> <attached-scheduler-name> attached-scheduler-name </attached-scheduler-name> </policy-scheduler>
Description
Information about scheduler attached to the policy
<policy-scheduler>
Usage
<policy-information> <policy-scheduler> <attached-scheduler-name> attached-scheduler-name </attached-scheduler-name> </policy-scheduler> </policy-information>
Description
Information about scheduler attached to the policy
<policy-scheduler>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-scheduler> <attached-scheduler-name> attached-scheduler-name </attached-scheduler-name> </policy-scheduler> </policy-information> </policies> </security-context> </security-policies>
Description
Information about scheduler attached to the policy
<policy-scheduler>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-scheduler> <attached-scheduler-name> attached-scheduler-name </attached-scheduler-name> </policy-scheduler> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about scheduler attached to the policy
<policy-scheduler>
Usage
<security-policy-match> <policy-information> <policy-scheduler> <attached-scheduler-name> attached-scheduler-name </attached-scheduler-name> </policy-scheduler> </policy-information> </security-policy-match>
Description
Information about scheduler attached to the policy
<policy-shadow-policies>
Usage
<policy-shadow-policies> <policy-shadow-policy>....</policy-shadow-policy> </policy-shadow-policies>
Description
Show shadow policy information
<policy-shadow-policies>
Usage
<security-policy-shadow> <policy-shadow-policies> <policy-shadow-policy>....</policy-shadow-policy> </policy-shadow-policies> </security-policy-shadow>
Description
Show shadow policy information
<policy-shadow-policy>
Usage
<policy-shadow-policies> <policy-shadow-policy> <policy-shadow-policy-original-policy> policy-shadow-policy-original-policy </policy-shadow-policy-original-policy> <policy-shadow-policy-shadowed-policy> policy-shadow-policy-shadowed-policy </policy-shadow-policy-shadowed-policy> </policy-shadow-policy> </policy-shadow-policies>
Description
Information about a shadow policy
<policy-shadow-policy>
Usage
<security-policy-shadow> <policy-shadow-policies> <policy-shadow-policy> <policy-shadow-policy-original-policy> policy-shadow-policy-original-policy </policy-shadow-policy-original-policy> <policy-shadow-policy-shadowed-policy> policy-shadow-policy-shadowed-policy </policy-shadow-policy-shadowed-policy> </policy-shadow-policy> </policy-shadow-policies> </security-policy-shadow>
Description
Information about a shadow policy
<policy-statistics-information>
Usage
<policy-statistics-information> <pfe-identifier> pfe-identifier </pfe-identifier> <input-bytes> input-bytes </input-bytes> <output-bytes> output-bytes </output-bytes> <input-byte-rate> input-byte-rate </input-byte-rate> <output-byte-rate> output-byte-rate </output-byte-rate> <input-packets> input-packets </input-packets> <output-packets> output-packets </output-packets> <input-packet-rate> input-packet-rate </input-packet-rate> <output-packet-rate> output-packet-rate </output-packet-rate> <session-creations> session-creations </session-creations> <session-deletions> session-deletions </session-deletions> <session-creation-rate> session-creation-rate </session-creation-rate> <active-sessions> active-sessions </active-sessions> <policy-lookups> policy-lookups </policy-lookups> </policy-statistics-information>
Description
Statistics about the policy
<policy-statistics-information>
Usage
<policy-information> <policy-statistics-information> <pfe-identifier> pfe-identifier </pfe-identifier> <input-bytes> input-bytes </input-bytes> <output-bytes> output-bytes </output-bytes> <input-byte-rate> input-byte-rate </input-byte-rate> <output-byte-rate> output-byte-rate </output-byte-rate> <input-packets> input-packets </input-packets> <output-packets> output-packets </output-packets> <input-packet-rate> input-packet-rate </input-packet-rate> <output-packet-rate> output-packet-rate </output-packet-rate> <session-creations> session-creations </session-creations> <session-deletions> session-deletions </session-deletions> <session-creation-rate> session-creation-rate </session-creation-rate> <active-sessions> active-sessions </active-sessions> <policy-lookups> policy-lookups </policy-lookups> </policy-statistics-information> </policy-information>
Description
Statistics about the policy
<policy-statistics-information>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-statistics-information> <pfe-identifier> pfe-identifier </pfe-identifier> <input-bytes> input-bytes </input-bytes> <output-bytes> output-bytes </output-bytes> <input-byte-rate> input-byte-rate </input-byte-rate> <output-byte-rate> output-byte-rate </output-byte-rate> <input-packets> input-packets </input-packets> <output-packets> output-packets </output-packets> <input-packet-rate> input-packet-rate </input-packet-rate> <output-packet-rate> output-packet-rate </output-packet-rate> <session-creations> session-creations </session-creations> <session-deletions> session-deletions </session-deletions> <session-creation-rate> session-creation-rate </session-creation-rate> <active-sessions> active-sessions </active-sessions> <policy-lookups> policy-lookups </policy-lookups> </policy-statistics-information> </policy-information> </policies> </security-context> </security-policies>
Description
Statistics about the policy
<policy-statistics-information>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-statistics-information> <pfe-identifier> pfe-identifier </pfe-identifier> <input-bytes> input-bytes </input-bytes> <output-bytes> output-bytes </output-bytes> <input-byte-rate> input-byte-rate </input-byte-rate> <output-byte-rate> output-byte-rate </output-byte-rate> <input-packets> input-packets </input-packets> <output-packets> output-packets </output-packets> <input-packet-rate> input-packet-rate </input-packet-rate> <output-packet-rate> output-packet-rate </output-packet-rate> <session-creations> session-creations </session-creations> <session-deletions> session-deletions </session-deletions> <session-creation-rate> session-creation-rate </session-creation-rate> <active-sessions> active-sessions </active-sessions> <policy-lookups> policy-lookups </policy-lookups> </policy-statistics-information> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Statistics about the policy
<policy-statistics-information>
Usage
<security-policy-match> <policy-information> <policy-statistics-information> <pfe-identifier> pfe-identifier </pfe-identifier> <input-bytes> input-bytes </input-bytes> <output-bytes> output-bytes </output-bytes> <input-byte-rate> input-byte-rate </input-byte-rate> <output-byte-rate> output-byte-rate </output-byte-rate> <input-packets> input-packets </input-packets> <output-packets> output-packets </output-packets> <input-packet-rate> input-packet-rate </input-packet-rate> <output-packet-rate> output-packet-rate </output-packet-rate> <session-creations> session-creations </session-creations> <session-deletions> session-deletions </session-deletions> <session-creation-rate> session-creation-rate </session-creation-rate> <active-sessions> active-sessions </active-sessions> <policy-lookups> policy-lookups </policy-lookups> </policy-statistics-information> </policy-information> </security-policy-match>
Description
Statistics about the policy
<policy-tcp-options>
Usage
<policy-tcp-options> <policy-tcp-options-syn-check> policy-tcp-options-syn-check </policy-tcp-options-syn-check> <policy-tcp-options-sequence-check> policy-tcp-options-sequence-check </policy-tcp-options-sequence-check> </policy-tcp-options>
Description
Information about the TCP options of policy
<policy-tcp-options>
Usage
<policy-information> <policy-tcp-options> <policy-tcp-options-syn-check> policy-tcp-options-syn-check </policy-tcp-options-syn-check> <policy-tcp-options-sequence-check> policy-tcp-options-sequence-check </policy-tcp-options-sequence-check> </policy-tcp-options> </policy-information>
Description
Information about the TCP options of policy
<policy-tcp-options>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-tcp-options> <policy-tcp-options-syn-check> policy-tcp-options-syn-check </policy-tcp-options-syn-check> <policy-tcp-options-sequence-check> policy-tcp-options-sequence-check </policy-tcp-options-sequence-check> </policy-tcp-options> </policy-information> </policies> </security-context> </security-policies>
Description
Information about the TCP options of policy
<policy-tcp-options>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-tcp-options> <policy-tcp-options-syn-check> policy-tcp-options-syn-check </policy-tcp-options-syn-check> <policy-tcp-options-sequence-check> policy-tcp-options-sequence-check </policy-tcp-options-sequence-check> </policy-tcp-options> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about the TCP options of policy
<policy-tcp-options>
Usage
<security-policy-match> <policy-information> <policy-tcp-options> <policy-tcp-options-syn-check> policy-tcp-options-syn-check </policy-tcp-options-syn-check> <policy-tcp-options-sequence-check> policy-tcp-options-sequence-check </policy-tcp-options-sequence-check> </policy-tcp-options> </policy-information> </security-policy-match>
Description
Information about the TCP options of policy
<policy-tunnel>
Usage
<policy-tunnel> <tunnel-type> tunnel-type </tunnel-type> <tunnel-name> tunnel-name </tunnel-name> <tunnel-identifier> tunnel-identifier </tunnel-identifier> <pair-policy-name> pair-policy-name </pair-policy-name> </policy-tunnel>
Description
Information about the policy-based tunnel
<policy-tunnel>
Usage
<policy-information> <policy-tunnel> <tunnel-type> tunnel-type </tunnel-type> <tunnel-name> tunnel-name </tunnel-name> <tunnel-identifier> tunnel-identifier </tunnel-identifier> <pair-policy-name> pair-policy-name </pair-policy-name> </policy-tunnel> </policy-information>
Description
Information about the policy-based tunnel
<policy-tunnel>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-tunnel> <tunnel-type> tunnel-type </tunnel-type> <tunnel-name> tunnel-name </tunnel-name> <tunnel-identifier> tunnel-identifier </tunnel-identifier> <pair-policy-name> pair-policy-name </pair-policy-name> </policy-tunnel> </policy-information> </policies> </security-context> </security-policies>
Description
Information about the policy-based tunnel
<policy-tunnel>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-tunnel> <tunnel-type> tunnel-type </tunnel-type> <tunnel-name> tunnel-name </tunnel-name> <tunnel-identifier> tunnel-identifier </tunnel-identifier> <pair-policy-name> pair-policy-name </pair-policy-name> </policy-tunnel> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about the policy-based tunnel
<policy-tunnel>
Usage
<security-policy-match> <policy-information> <policy-tunnel> <tunnel-type> tunnel-type </tunnel-type> <tunnel-name> tunnel-name </tunnel-name> <tunnel-identifier> tunnel-identifier </tunnel-identifier> <pair-policy-name> pair-policy-name </pair-policy-name> </policy-tunnel> </policy-information> </security-policy-match>
Description
Information about the policy-based tunnel
<policy-type-information>
Usage
<policy-type-information> <policy-type-string> policy-type-string </policy-type-string> <policy-type-dynamic-policy-count> policy-type-dynamic-policy-count </policy-type-dynamic-policy-count> </policy-type-information>
Description
Information about the type of policy
<policy-type-information>
Usage
<policy-information> <policy-type-information> <policy-type-string> policy-type-string </policy-type-string> <policy-type-dynamic-policy-count> policy-type-dynamic-policy-count </policy-type-dynamic-policy-count> </policy-type-information> </policy-information>
Description
Information about the type of policy
<policy-type-information>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-type-information> <policy-type-string> policy-type-string </policy-type-string> <policy-type-dynamic-policy-count> policy-type-dynamic-policy-count </policy-type-dynamic-policy-count> </policy-type-information> </policy-information> </policies> </security-context> </security-policies>
Description
Information about the type of policy
<policy-type-information>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-type-information> <policy-type-string> policy-type-string </policy-type-string> <policy-type-dynamic-policy-count> policy-type-dynamic-policy-count </policy-type-dynamic-policy-count> </policy-type-information> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about the type of policy
<policy-type-information>
Usage
<security-policy-match> <policy-information> <policy-type-information> <policy-type-string> policy-type-string </policy-type-string> <policy-type-dynamic-policy-count> policy-type-dynamic-policy-count </policy-type-dynamic-policy-count> </policy-type-information> </policy-information> </security-policy-match>
Description
Information about the type of policy
<policy-zone-context>
Usage
<policy-zone-context> <logical-system-name> logical-system-name </logical-system-name> <policy-zone-context-entry>....</policy-zone-context-entry> </policy-zone-context>
Description
Show policy zone context
<policy-zone-context>
Usage
<security-policies> <policy-zone-context> <logical-system-name> logical-system-name </logical-system-name> <policy-zone-context-entry>....</policy-zone-context-entry> </policy-zone-context> </security-policies>
Description
Show policy zone context
<policy-zone-context-entry>
Usage
<policy-zone-context> <policy-zone-context-entry> <policy-zone-context-from-zone> policy-zone-context-from-zone </policy-zone-context-from-zone> <policy-zone-context-to-zone> policy-zone-context-to-zone </policy-zone-context-to-zone> <policy-zone-context-policy-count> policy-zone-context-policy-count </policy-zone-context-policy-count> </policy-zone-context-entry> </policy-zone-context>
Description
Information about a context
<policy-zone-context-entry>
Usage
<security-policies> <policy-zone-context> <policy-zone-context-entry> <policy-zone-context-from-zone> policy-zone-context-from-zone </policy-zone-context-from-zone> <policy-zone-context-to-zone> policy-zone-context-to-zone </policy-zone-context-to-zone> <policy-zone-context-policy-count> policy-zone-context-policy-count </policy-zone-context-policy-count> </policy-zone-context-entry> </policy-zone-context> </security-policies>
Description
Information about a context
<prefixes>
Usage
<prefixes> <address-prefix> address-prefix </address-prefix> </prefixes>
Description
IP prefixes for an address
<prefixes>
Usage
<destination-addresses> <destination-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </destination-address> </destination-addresses>
Description
IP prefixes for an address
<prefixes>
Usage
<source-addresses> <source-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </source-address> </source-addresses>
Description
IP prefixes for an address
<prefixes>
Usage
<policy-information> <source-addresses> <source-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </source-address> </source-addresses> </policy-information>
Description
IP prefixes for an address
<prefixes>
Usage
<policy-information> <destination-addresses> <destination-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </destination-address> </destination-addresses> </policy-information>
Description
IP prefixes for an address
<prefixes>
Usage
<security-policies> <security-context> <policies> <policy-information> <source-addresses> <source-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </source-address> </source-addresses> </policy-information> </policies> </security-context> </security-policies>
Description
IP prefixes for an address
<prefixes>
Usage
<security-policies> <security-context> <policies> <policy-information> <destination-addresses> <destination-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </destination-address> </destination-addresses> </policy-information> </policies> </security-context> </security-policies>
Description
IP prefixes for an address
<prefixes>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <source-addresses> <source-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </source-address> </source-addresses> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
IP prefixes for an address
<prefixes>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <destination-addresses> <destination-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </destination-address> </destination-addresses> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
IP prefixes for an address
<prefixes>
Usage
<security-policy-match> <policy-information> <source-addresses> <source-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </source-address> </source-addresses> </policy-information> </security-policy-match>
Description
IP prefixes for an address
<prefixes>
Usage
<security-policy-match> <policy-information> <destination-addresses> <destination-address> <prefixes> <address-prefix> address-prefix </address-prefix> </prefixes> </destination-address> </destination-addresses> </policy-information> </security-policy-match>
Description
IP prefixes for an address
<program-number-range>
Usage
<applications> <application> <application-term> <rpc-information> <program-number-range> <low> low </low> <high> high </high> </program-number-range> </rpc-information> </application-term> </application> </applications>
Description
<program-number-range>
Usage
<policy-information> <applications> <application> <application-term> <rpc-information> <program-number-range> <low> low </low> <high> high </high> </program-number-range> </rpc-information> </application-term> </application> </applications> </policy-information>
Description
<program-number-range>
Usage
<security-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <rpc-information> <program-number-range> <low> low </low> <high> high </high> </program-number-range> </rpc-information> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-policies>
Description
<program-number-range>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <rpc-information> <program-number-range> <low> low </low> <high> high </high> </program-number-range> </rpc-information> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
<program-number-range>
Usage
<security-policy-match> <policy-information> <applications> <application> <application-term> <rpc-information> <program-number-range> <low> low </low> <high> high </high> </program-number-range> </rpc-information> </application-term> </application> </applications> </policy-information> </security-policy-match>
Description
<rpc-information>
Usage
<applications> <application> <application-term> <rpc-information> <program-number-range>....</program-number-range> <rpc-uuid> rpc-uuid </rpc-uuid> </rpc-information> </application-term> </application> </applications>
Description
RPC type information
<rpc-information>
Usage
<policy-information> <applications> <application> <application-term> <rpc-information> <program-number-range>....</program-number-range> <rpc-uuid> rpc-uuid </rpc-uuid> </rpc-information> </application-term> </application> </applications> </policy-information>
Description
RPC type information
<rpc-information>
Usage
<security-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <rpc-information> <program-number-range>....</program-number-range> <rpc-uuid> rpc-uuid </rpc-uuid> </rpc-information> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-policies>
Description
RPC type information
<rpc-information>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <rpc-information> <program-number-range>....</program-number-range> <rpc-uuid> rpc-uuid </rpc-uuid> </rpc-information> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
RPC type information
<rpc-information>
Usage
<security-policy-match> <policy-information> <applications> <application> <application-term> <rpc-information> <program-number-range>....</program-number-range> <rpc-uuid> rpc-uuid </rpc-uuid> </rpc-information> </application-term> </application> </applications> </policy-information> </security-policy-match>
Description
RPC type information
<rule>
Usage
<policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <name> name </name> <dynamic-application-list>....</dynamic-application-list> <dynamic-application-group-list>....</dynamic-application-group-list> <action> action </action> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services>
Description
Information of the rule
<rule>
Usage
<policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <name> name </name> <dynamic-application-list>....</dynamic-application-list> <dynamic-application-group-list>....</dynamic-application-group-list> <action> action </action> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information>
Description
Information of the rule
<rule>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <name> name </name> <dynamic-application-list>....</dynamic-application-list> <dynamic-application-group-list>....</dynamic-application-group-list> <action> action </action> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of the rule
<rule>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <name> name </name> <dynamic-application-list>....</dynamic-application-list> <dynamic-application-group-list>....</dynamic-application-group-list> <action> action </action> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of the rule
<rule>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule> <name> name </name> <dynamic-application-list>....</dynamic-application-list> <dynamic-application-group-list>....</dynamic-application-group-list> <action> action </action> </rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of the rule
<rule-list>
Usage
<policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule>....</rule> <default-rule>....</default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services>
Description
Information of all rules
<rule-list>
Usage
<policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule>....</rule> <default-rule>....</default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information>
Description
Information of all rules
<rule-list>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule>....</rule> <default-rule>....</default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of all rules
<rule-list>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule>....</rule> <default-rule>....</default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of all rules
<rule-list>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <rule-list> <rule>....</rule> <default-rule>....</default-rule> </rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of all rules
<rule-set>
Usage
<policy-application-services> <application-firewall> <rule-set-info> <rule-set> <name> name </name> <rule-list>....</rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services>
Description
<rule-set>
Usage
<policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <name> name </name> <rule-list>....</rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information>
Description
<rule-set>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <name> name </name> <rule-list>....</rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
<rule-set>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <name> name </name> <rule-list>....</rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
<rule-set>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set> <name> name </name> <rule-list>....</rule-list> </rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </security-policy-match>
Description
<rule-set-info>
Usage
<policy-application-services> <application-firewall> <rule-set-info> <rule-set>....</rule-set> </rule-set-info> </application-firewall> </policy-application-services>
Description
Information of the rule-set
<rule-set-info>
Usage
<policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set>....</rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information>
Description
Information of the rule-set
<rule-set-info>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set>....</rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of the rule-set
<rule-set-info>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set>....</rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of the rule-set
<rule-set-info>
Usage
<security-policy-match> <policy-information> <policy-application-services> <application-firewall> <rule-set-info> <rule-set>....</rule-set> </rule-set-info> </application-firewall> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of the rule-set
<security-context>
Usage
<security-policies> <security-context> <context-information>....</context-information> <policies>....</policies> </security-context> </security-policies>
Description
Information about the security context
<security-context>
Usage
<security-dynamic-policies> <security-context> <context-information>....</context-information> <policies>....</policies> </security-context> </security-dynamic-policies>
Description
Information about the security context
<security-dns-cache>
Usage
<security-dns-cache> <dns-cache>....</dns-cache> </security-dns-cache>
Description
DNS cache of firewall policy
<security-dynamic-policies>
Usage
<security-dynamic-policies> <security-context>....</security-context> </security-dynamic-policies>
Description
Information about security dynamic policies
<security-policies>
Usage
<security-policies> <logical-system-name> logical-system-name </logical-system-name> <default-policy> default-policy </default-policy> <security-context>....</security-context> <policy-internal-information>....</policy-internal-information> <policy-zone-context>....</policy-zone-context> <policy-context-checksum-info>....</policy-context-checksum-info> </security-policies>
Description
Information about security policies
<security-policy-match>
Usage
<security-policy-match> <policy-information>....</policy-information> </security-policy-match>
Description
Find policy match for a given traffic
<security-policy-shadow>
Usage
<security-policy-shadow> <policy-shadow-policies>....</policy-shadow-policies> </security-policy-shadow>
Description
Shadow policy information for a given context
<source-address>
Usage
<source-addresses> <source-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </source-address> </source-addresses>
Description
Information about a source address
<source-address>
Usage
<policy-information> <source-addresses> <source-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </source-address> </source-addresses> </policy-information>
Description
Information about a source address
<source-address>
Usage
<security-policies> <security-context> <policies> <policy-information> <source-addresses> <source-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </source-address> </source-addresses> </policy-information> </policies> </security-context> </security-policies>
Description
Information about a source address
<source-address>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <source-addresses> <source-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </source-address> </source-addresses> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about a source address
<source-address>
Usage
<security-policy-match> <policy-information> <source-addresses> <source-address> <address-name> address-name </address-name> <prefixes>....</prefixes> </source-address> </source-addresses> </policy-information> </security-policy-match>
Description
Information about a source address
<source-addresses>
Usage
<source-addresses> <source-address>....</source-address> </source-addresses>
Description
<source-addresses>
Usage
<policy-information> <source-addresses> <source-address>....</source-address> </source-addresses> </policy-information>
Description
<source-addresses>
Usage
<security-policies> <security-context> <policies> <policy-information> <source-addresses> <source-address>....</source-address> </source-addresses> </policy-information> </policies> </security-context> </security-policies>
Description
<source-addresses>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <source-addresses> <source-address>....</source-address> </source-addresses> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
<source-addresses>
Usage
<security-policy-match> <policy-information> <source-addresses> <source-address>....</source-address> </source-addresses> </policy-information> </security-policy-match>
Description
<source-identities>
Usage
<source-identities> <source-identity>....</source-identity> </source-identities>
Description
<source-identities>
Usage
<policy-information> <source-identities> <source-identity>....</source-identity> </source-identities> </policy-information>
Description
<source-identities>
Usage
<security-policies> <security-context> <policies> <policy-information> <source-identities> <source-identity>....</source-identity> </source-identities> </policy-information> </policies> </security-context> </security-policies>
Description
<source-identities>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <source-identities> <source-identity>....</source-identity> </source-identities> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
<source-identities>
Usage
<security-policy-match> <policy-information> <source-identities> <source-identity>....</source-identity> </source-identities> </policy-information> </security-policy-match>
Description
<source-identity>
Usage
<source-identities> <source-identity> <role-name> role-name </role-name> </source-identity> </source-identities>
Description
Information about a source identity
<source-identity>
Usage
<policy-information> <source-identities> <source-identity> <role-name> role-name </role-name> </source-identity> </source-identities> </policy-information>
Description
Information about a source identity
<source-identity>
Usage
<security-policies> <security-context> <policies> <policy-information> <source-identities> <source-identity> <role-name> role-name </role-name> </source-identity> </source-identities> </policy-information> </policies> </security-context> </security-policies>
Description
Information about a source identity
<source-identity>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <source-identities> <source-identity> <role-name> role-name </role-name> </source-identity> </source-identities> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information about a source identity
<source-identity>
Usage
<security-policy-match> <policy-information> <source-identities> <source-identity> <role-name> role-name </role-name> </source-identity> </source-identities> </policy-information> </security-policy-match>
Description
Information about a source identity
<source-port-range>
Usage
<applications> <application> <application-term> <source-port-range> <low> low </low> <high> high </high> </source-port-range> </application-term> </application> </applications>
Description
Range of the source ports
<source-port-range>
Usage
<policy-information> <applications> <application> <application-term> <source-port-range> <low> low </low> <high> high </high> </source-port-range> </application-term> </application> </applications> </policy-information>
Description
Range of the source ports
<source-port-range>
Usage
<security-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <source-port-range> <low> low </low> <high> high </high> </source-port-range> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-policies>
Description
Range of the source ports
<source-port-range>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <applications> <application> <application-term> <source-port-range> <low> low </low> <high> high </high> </source-port-range> </application-term> </application> </applications> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Range of the source ports
<source-port-range>
Usage
<security-policy-match> <policy-information> <applications> <application> <application-term> <source-port-range> <low> low </low> <high> high </high> </source-port-range> </application-term> </application> </applications> </policy-information> </security-policy-match>
Description
Range of the source ports
<ssl-initiation>
Usage
<policy-application-services> <ssl-initiation> <ssl-initiation-profile-name> ssl-initiation-profile-name </ssl-initiation-profile-name> </ssl-initiation> </policy-application-services>
Description
Information of the SSL initiation
<ssl-initiation>
Usage
<policy-information> <policy-application-services> <ssl-initiation> <ssl-initiation-profile-name> ssl-initiation-profile-name </ssl-initiation-profile-name> </ssl-initiation> </policy-application-services> </policy-information>
Description
Information of the SSL initiation
<ssl-initiation>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <ssl-initiation> <ssl-initiation-profile-name> ssl-initiation-profile-name </ssl-initiation-profile-name> </ssl-initiation> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of the SSL initiation
<ssl-initiation>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <ssl-initiation> <ssl-initiation-profile-name> ssl-initiation-profile-name </ssl-initiation-profile-name> </ssl-initiation> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of the SSL initiation
<ssl-initiation>
Usage
<security-policy-match> <policy-information> <policy-application-services> <ssl-initiation> <ssl-initiation-profile-name> ssl-initiation-profile-name </ssl-initiation-profile-name> </ssl-initiation> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of the SSL initiation
<ssl-proxy>
Usage
<policy-application-services> <ssl-proxy> <ssl-proxy-profile-name> ssl-proxy-profile-name </ssl-proxy-profile-name> </ssl-proxy> </policy-application-services>
Description
Information of the SSL proxy
<ssl-proxy>
Usage
<policy-information> <policy-application-services> <ssl-proxy> <ssl-proxy-profile-name> ssl-proxy-profile-name </ssl-proxy-profile-name> </ssl-proxy> </policy-application-services> </policy-information>
Description
Information of the SSL proxy
<ssl-proxy>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <ssl-proxy> <ssl-proxy-profile-name> ssl-proxy-profile-name </ssl-proxy-profile-name> </ssl-proxy> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of the SSL proxy
<ssl-proxy>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <ssl-proxy> <ssl-proxy-profile-name> ssl-proxy-profile-name </ssl-proxy-profile-name> </ssl-proxy> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of the SSL proxy
<ssl-proxy>
Usage
<security-policy-match> <policy-information> <policy-application-services> <ssl-proxy> <ssl-proxy-profile-name> ssl-proxy-profile-name </ssl-proxy-profile-name> </ssl-proxy> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of the SSL proxy
<ssl-termination>
Usage
<policy-application-services> <ssl-termination> <ssl-termination-profile-name> ssl-termination-profile-name </ssl-termination-profile-name> </ssl-termination> </policy-application-services>
Description
Information of the SSL termination
<ssl-termination>
Usage
<policy-information> <policy-application-services> <ssl-termination> <ssl-termination-profile-name> ssl-termination-profile-name </ssl-termination-profile-name> </ssl-termination> </policy-application-services> </policy-information>
Description
Information of the SSL termination
<ssl-termination>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <ssl-termination> <ssl-termination-profile-name> ssl-termination-profile-name </ssl-termination-profile-name> </ssl-termination> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Information of the SSL termination
<ssl-termination>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <ssl-termination> <ssl-termination-profile-name> ssl-termination-profile-name </ssl-termination-profile-name> </ssl-termination> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Information of the SSL termination
<ssl-termination>
Usage
<security-policy-match> <policy-information> <policy-application-services> <ssl-termination> <ssl-termination-profile-name> ssl-termination-profile-name </ssl-termination-profile-name> </ssl-termination> </policy-application-services> </policy-information> </security-policy-match>
Description
Information of the SSL termination
<wx-optimizer>
Usage
<policy-application-services> <wx-optimizer> <wx-optimizer-profile-name> wx-optimizer-profile-name </wx-optimizer-profile-name> <wx-optimizer-service-options> wx-optimizer-service-options </wx-optimizer-service-options> </wx-optimizer> </policy-application-services>
Description
Wan-optimizer configuration
<wx-optimizer>
Usage
<policy-information> <policy-application-services> <wx-optimizer> <wx-optimizer-profile-name> wx-optimizer-profile-name </wx-optimizer-profile-name> <wx-optimizer-service-options> wx-optimizer-service-options </wx-optimizer-service-options> </wx-optimizer> </policy-application-services> </policy-information>
Description
Wan-optimizer configuration
<wx-optimizer>
Usage
<security-policies> <security-context> <policies> <policy-information> <policy-application-services> <wx-optimizer> <wx-optimizer-profile-name> wx-optimizer-profile-name </wx-optimizer-profile-name> <wx-optimizer-service-options> wx-optimizer-service-options </wx-optimizer-service-options> </wx-optimizer> </policy-application-services> </policy-information> </policies> </security-context> </security-policies>
Description
Wan-optimizer configuration
<wx-optimizer>
Usage
<security-dynamic-policies> <security-context> <policies> <policy-information> <policy-application-services> <wx-optimizer> <wx-optimizer-profile-name> wx-optimizer-profile-name </wx-optimizer-profile-name> <wx-optimizer-service-options> wx-optimizer-service-options </wx-optimizer-service-options> </wx-optimizer> </policy-application-services> </policy-information> </policies> </security-context> </security-dynamic-policies>
Description
Wan-optimizer configuration
<wx-optimizer>
Usage
<security-policy-match> <policy-information> <policy-application-services> <wx-optimizer> <wx-optimizer-profile-name> wx-optimizer-profile-name </wx-optimizer-profile-name> <wx-optimizer-service-options> wx-optimizer-service-options </wx-optimizer-service-options> </wx-optimizer> </policy-application-services> </policy-information> </security-policy-match>
Description
Wan-optimizer configuration