Related Documentation
- J Series
- Security Policies Overview in the Junos OS Security Configuration Guide

- Understanding Policy Application Timeout Configuration and Lookup in the Junos OS Security Configuration Guide

- SRX Series
- Example: Configuring Security Policies in a User Logical System
- Understanding Logical Systems Security Profiles
- User Logical System Configuration Overview
- Security Policies Overview in the Junos OS Security Configuration Guide

- Understanding Policy Application Timeout Configuration and Lookup in the Junos OS Security Configuration Guide

Understanding Logical System Security Policies
Security Policies in Logical Systems
Security policies enforce rules for what traffic can pass through the firewall and actions that need to take place on the traffic as it passes through the firewall. From the perspective of security policies, traffic enters one security zone and exits another security zone.
By default, a logical system denies all traffic in all directions, including intra-zone and inter-zone directions. Through the creation of security policies, the logical system administrator can control the traffic flow from zone to zone by defining the kinds of traffic permitted to pass from specified sources to specified destinations.
Security policies can be configured in the master logical system and in user logical systems. Configuring a security policy in a logical system is the same as configuring a security policy on a device that is not configured for logical systems. Any security policies, policy rules, address books, applications and application sets, and schedulers created within a logical system are only applicable to that logical system. Only predefined applications and application sets, such as junos-ftp, can be shared between logical systems.
![]() | Note: In a logical system, you cannot specify global as either the from-zone or the to-zone in a security policy. |
The user logical system administrator can configure and view all attributes for security policies in a user logical system. All attributes of a security policy in a user logical system are also visible to the master administrator.
Application Timeouts
The application timeout value set for an application determines the session timeout. Application timeout behavior is the same in a logical system as at the root level. However, user logical system administrators can use predefined applications in security policies but cannot modify the timeout value of predefined applications. This is because the predefined applications are shared by the master logical system and all user logical systems, so the user logical system administrator is not allowed to change its behavior. Application timeout values are stored in the application entry database and in the corresponding logical system TCP and UDP port-based timeout tables.
If the application that is matched for the traffic has a timeout value, that timeout value is used. Otherwise, the lookup proceeds in the following order until an application timeout value is found:
- The logical system TCP and UDP port-based timeout table is searched for a timeout value.
- The root TCP and UDP port-based timeout table is searched for a timeout value.
- The protocol-based default timeout table is searched for a timeout value.
Security Policy Allocation
The master administrator configures the maximum and reserved numbers of security policies for each user logical system. The user logical system administrator can then create security policies in the user logical system. From a user logical system, the user logical system administrator can use the show system security-profile policy command to view the number of security policies allocated to the user logical system.
![]() | Note: The master administrator can configure a security profile for the master logical system that specifies the maximum and reserved numbers of security policies applied to the master logical system. The number of policies configured in the master logical system count toward the maximum number of policies available on the device. |
Related Documentation
- J Series
- Security Policies Overview in the Junos OS Security Configuration Guide

- Understanding Policy Application Timeout Configuration and Lookup in the Junos OS Security Configuration Guide

- SRX Series
- Example: Configuring Security Policies in a User Logical System
- Understanding Logical Systems Security Profiles
- User Logical System Configuration Overview
- Security Policies Overview in the Junos OS Security Configuration Guide

- Understanding Policy Application Timeout Configuration and Lookup in the Junos OS Security Configuration Guide



