Related Documentation
- J Series
- Understanding Security Policy Rules
- Understanding Security Policy Elements
- Troubleshooting Security Policies
- SRX Series
- Understanding Security Policy Rules
- Understanding Security Policy Elements
- Troubleshooting Security Policies
- Additional Information
- Junos OS Feature Support Reference for SRX Series and J Series Devices

Security Policies Configuration Overview
You must complete the following tasks to create a security policy:
Create zones. See Example: Creating Security Zones.
Configure an address book with addresses for the policy. See Example: Configuring Address Books and Address Sets.
Create an application (or application set) that indicates that the policy applies to traffic of that type. See Example: Configuring Applications and Application Sets.
Create schedulers if you plan to use them for your policies. See Example: Configuring Schedulers.
The Firewall Policy Wizard enables you to perform basic security policy configuration. For more advanced configuration, use the J-Web interface or the CLI.
Related Documentation
- J Series
- Understanding Security Policy Rules
- Understanding Security Policy Elements
- Troubleshooting Security Policies
- SRX Series
- Understanding Security Policy Rules
- Understanding Security Policy Elements
- Troubleshooting Security Policies
- Additional Information
- Junos OS Feature Support Reference for SRX Series and J Series Devices


