Monitor Shadow Policies
You are here: Monitor > Security Services > Policy > Shadow Policies.
Use this page to check the policy list. You can enter a criteria and conduct a policy search. The search results include all policies that match the traffic criteria in the sequence in which they will be encountered.
Table 1 describes the fields on the Shadow Policies page.
Table 1: Fields on the Shadow Policies Page
|Check Policies Search|
Specifies the source zone policy.
Options available are:
Specifies that the policy defined is a global policy and zones are not required.
Address of the source in IP notation.
Port number of the source.
Address of the destination in IP notation.
Port number of the destination.
Name of the source identity.
Name or equivalent value of the protocol to be matched.
Enable you to search for a particular data in the page.
Enable you to get back to the default configuration.
|Check Policies List|
Name of the source zone.
Name of the destination zone.
Select according to the requirement:
Number of policies retrieved.
Default Policy action
The action to be taken if no match occurs.
Name of the source address (not the IP address) of a policy. Address sets are resolved to their individual names.
Displays the destination address.
Name of the source identity for the policy.
Name of a pre configured or custom application of the policy match.
Action taken when a match occurs as specified in the policy.
Number of matches for this policy. This value is the same as the Policy Lookups in a policy statistics report.
Number of active sessions matching this policy.