Navigation
Table of Contents
Guide That Contains This Content
[+] Expand All
[-] Collapse All
Related Documentation
- J Series
- Security Policies Overview
- Understanding Security Policy Rules
- Security Policies Configuration Overview
- Understanding Security Policy Ordering
- SRX Series
- Security Policies Overview
- Understanding Security Policy Rules
- Security Policies Configuration Overview
- Understanding Security Policy Ordering
- Additional Information
- Junos OS Feature Support Reference for SRX Series and J Series Devices

- Junos OS CLI Reference

Understanding Security Policy Elements
A policy permits, denies, or tunnels specified types of traffic unidirectionally between two points.
Each policy consists of:
- A unique name for the policy.
- A from-zone and a to-zone, for example: user@host# set security policy from-zone untrust to-zone untrust
- A set of match criteria defining the conditions that must be satisfied to apply the policy rule. The match criteria are based on a source IP address, destination IP address, and applications.
- A set of actions to be performed in case of a match—permit, deny, or reject.
- Accounting and auditing elements—counting, logging, or structured system logging.
Related Documentation
- J Series
- Security Policies Overview
- Understanding Security Policy Rules
- Security Policies Configuration Overview
- Understanding Security Policy Ordering
- SRX Series
- Security Policies Overview
- Understanding Security Policy Rules
- Security Policies Configuration Overview
- Understanding Security Policy Ordering
- Additional Information
- Junos OS Feature Support Reference for SRX Series and J Series Devices

- Junos OS CLI Reference


