[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring a Policy to Permit Traffic

Configuring a policy to permit traffic is the first step in the sample configuration explaining how to configure a policy.

Before You Begin

  1. Establish basic connectivity. (See the Getting Started Guide for your device.)
  2. Create zones. See Creating Security Zones.
  3. Configure the address book for the policy. (See Configuring a Policy to Permit Traffic.)
  4. For background information, read Example: Configuring Security Policies—Detailed Configuration.

To configure a policy to permit traffic, use either J-Web or the CLI configuration editor. The following configuration commands allow traffic between the loopback addresses of both the Juniper Networks devices.

This topic covers:


[Contents] [Prev] [Next] [Index] [Report an Error]