Related Documentation
- J Series
- Security Policies Overview
- Monitoring Policy Statistics
- SRX Series
- Security Policies Overview
- Monitoring Policy Statistics
- Additional Information
- Junos OS Feature Support Reference for SRX Series and J Series Devices

Troubleshooting Security Policies
Checking a Security Policy Commit Failure
Problem
Most policy configuration failures occur during a commit or runtime.
Commit failures are reported directly on the CLI when you execute the CLI command commit-check in configuration mode. These errors are configuration errors, and you cannot commit the configuration without fixing these errors.
Solution
To fix these errors, do the following:
- Review your configuration data.
- Open the file /var/log/nsd_chk_only. This file is overwritten each time you perform a commit check and contains detailed failure information.
Verifying a Security Policy Commit
Problem
Upon performing a policy configuration commit, if you notice that the system behavior is incorrect, use the following steps to troubleshoot this problem:
Solution
- Operational show Commands—Execute the operational commands for security policies and verify that the information shown in the output is consistent with what you expected. If not, the configuration needs to be changed appropriately.
- Traceoptions—Set the traceoptions command
in your policy configuration. The flags under this hierarchy can be
selected as per user analysis of the show command output.
If you cannot determine what flag to use, the flag option all can be used to capture all trace logs. user@host# set security policies traceoptions <flag all>
You can also configure an optional filename to capture the logs.
If you specified a filename in the trace options, you can look in the /var/log/<filename> for the log file to ascertain if any errors were reported in the file. (If you did not specify a filename, the default filename is eventd.) The error messages indicate the place of failure and the appropriate reason.
After configuring the trace options, you must recommit the configuration change that caused the incorrect system behavior.
Debugging Policy Lookup
Problem
When you have the correct configuration, but some traffic was incorrectly dropped or permitted, you can enable the lookup flag in the security policies traceoptions. The lookup flag logs the lookup related traces in the trace file.
Solution
Related Documentation
- J Series
- Security Policies Overview
- Monitoring Policy Statistics
- SRX Series
- Security Policies Overview
- Monitoring Policy Statistics
- Additional Information
- Junos OS Feature Support Reference for SRX Series and J Series Devices


