Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Understanding Security Policy Elements

    A policy permits, denies, or tunnels specified types of traffic unidirectionally between two points.

    Each policy consists of:

    • A unique name for the policy.
    • A from-zone and a to-zone, for example: user@host# set security policy from-zone untrust to-zone untrust
    • A set of match criteria defining the conditions that must be satisfied to apply the policy rule. The match criteria are based on a source IP address, destination IP address, and applications.
    • A set of actions to be performed in case of a match—permit, deny, or reject.
    • Accounting and auditing elements—counting, logging, or structured system logging.

    Published: 2012-06-29