[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring a Policy to Deny Traffic

Configuring a policy to deny traffic is the second step in the sample configuration explaining how to configure a policy.

Before You Begin

  1. Establish basic connectivity. (See the Getting Started Guide for your device.)
  2. Create zones. See Creating Security Zones.
  3. Configure the address book for the policy. (See Configuring a Policy to Permit Traffic.)
  4. Configure a policy to permit traffic. (See Configuring a Policy to Permit Traffic.)
  5. For background information, read Example: Configuring Security Policies—Detailed Configuration.

To configure a policy to deny traffic, use either J-Web or the CLI configuration editor. The following configuration commands deny traffic between the loopback addresses of both the Juniper Networks devices.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]