Help Center User GuideGetting Started
 
X
User Guide
Getting Started
Contents  

About the Security Policies Page

You are here: Security Policies & Objects > Security Policies.

Use this page to get a high-level view of your firewall policy rules settings. The security policy applies the security rules to the transit traffic within a context (from-zone to to-zone). The traffic is classified by matching its source and destination zones, the source and destination addresses, and the application that the traffic carries in its protocol headers with the policy database in the data plane.

Using a global policy, you can regulate traffic with addresses and applications, regardless of their security zones, by referencing user-defined addresses or the predefined address “any.” These addresses can span multiple security zones.

Tasks You Can Perform

You can perform the following tasks from this page:

Table 174 describes few more options on Rules.

Table 174: More Options on the Security Policies Page

Field

Description

Create Rule Before

Adds a new rule before the selected rule.

Procedure

To add a new rule before the selected rule:

  1. Select an existing rule before which you want to create a rule.
  2. Click More > Create Rule Before.

    Alternatively, you can right-click on the selected rule and select Create Rule Before.

    Note:

    • When you create a new rule, it inherits the name, source zone, and destination zone same as parent (selected) rule. Source address and destination address will be any and the action will be Deny.

    • For global policy, source zone and destination zone will not be available.

  3. Click tick mark to create the new rule.

Create Rule After

Adds a new rule after the selected rule.

Procedure

To add a new rule after the selected rule:

  1. Select an existing rule after which you want to create a rule.
  2. Click More > Create Rule After.

    Alternatively, you can right-click on the selected rule and select Create Rule After.

    Note:

    • When you create a new rule, it inherits the name, source zone, and destination zone same as parent (selected) rule. Source address and destination address will be any and the action will be Deny.

    • For global policy, source zone and destination zone will not be available.

  3. Click tick mark to create the new rule.

Clone

Clones or copies the selected firewall policy configuration and enables you to update the details of the rule.

Clear All

Clears the selection of those rules that are selected.

Field Descriptions

Table 175 describes the fields on the Security Policies page.

Note On the Security Policies page:

  • For logical systems and tenants, the URL Categories option will not be displayed.

  • For tenants, the Dynamic Application option will not be displayed.

Table 175: Fields on the Security Policies Page

Field

Description

Seq

Displays the sequence number of rules in a zone pair.

Hits

Displays the number of hits the rule has encountered.

Rule Name

Displays the rule name.

You can hover over the name column to view the rule name and its description.

Source Zone

Displays the source zone that is specified in the zone pair for the rule.

Source Address

Displays the name of the source address or address set for the rule.

Source Identity

Displays the user identity of the rule.

Destination Zone

Displays the destination zone that is specified in the zone pair for the rule.

Destination Address

Displays the name of the destination address or address set for the rule.

Dynamic Application

Displays the dynamic application names for match criteria in application firewall rule set.

An application firewall configuration permits, rejects, or denies traffic based on the application of the traffic.

Services

Displays the type of service for the destination of the rule.

URL Category

Displays the URL category that you want to match criteria for web filtering category.

Action

Displays the actions that need to take place on the traffic as it passes through the firewall.

Advanced Security

Displays the security option that apply for this rule.

Rule Options

Displays the rule option while permitting the traffic.

Schedule

Displays the scheduler details that allow a policy to be activated for a specified duration.

You can define schedulers for a single (nonrecurrent) or recurrent time slot within which a policy is active.

Related Documentation

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit