[Contents] [Prev] [Next] [Index] [Report an Error]

show security policies

Syntax

show security policies
<detail>
<policy-name policy-name>

Release Information

Command modified in Release 9.2 of JUNOS software.

Description

Display a summary of all security policies configured on the device. If a particular policy is specified, display information particular to that policy.

This command is supported on J-series and SRX-series devices.

Options

none—Display basic information about all configured policies.

detail—(Optional) Display a detailed view of all of the policies configured on the device.

policy-name policy-name—(Optional) Display information about the specified policy.

Required Privilege Level

view

Related Topics

clear security policies statistics

List of Sample Output

show security policies
sshow security policies policy-name p1 detail

Output Fields

Table 88 lists the output fields for the show security policies command. Output fields are listed in the approximate order in which they appear.

Table 88: show security policies Output Fields

Field Name

Field Description

From zone

Name of the source zone.

To zone

Name of the destination zone.

Policy

Name of the applicable Policy.

Sequence number

Number of the policy within a given context. For example, three policies that are applicable in a from-zoneA to-zoneB context might be ordered with sequence numbers 1, 2, and 3. Also, in a from-zoneC to-zoneD context, four policies might have sequence numbers 1, 2, 3, and 4.

State

Status of the policy:

  • enabled: The policy can be used in the policy lookup process which determines access rights for a packet and the action taken in regard to it.
  • disabled: The policy cannot be used in the policy lookup process, and therefore it is not available for access control.

Source addresses

For standard display mode, the names of the source addresses for a policy. Address sets are resolved to their individual names. (In this case, only the names are given, not their IP addresses.)

For detail display mode, the names and corresponding IP addresses of the source addresses for a policy. Address sets are resolved to their individual address name-IP address pairs.

Destination addresses

Name of the destination address (or address set) as it was entered in the destination zone’s address book. A packet’s destination address must match this value for the policy to apply to it.

Applications

Name of a preconfigured or custom application whose type the packet matches, as specified at configuration time.

  • IP protocol: The IP protocol used by the application—for example, TCP, UDP, ICMP.
  • ALG: If an ALG is associated with the session, the name of the ALG. Otherwise, 0.
  • Inactivity timeout: Elapse time without activity after which the application is terminated.
  • Source port range: The low-high source port range for the session application.

Destination Address Translation

Status of the destination address translation traffic:

  • drop translated— Drop the packets with translated destination address.
  • drop untranslated—Drop the packets without translated destination address.

Action or Action-type

  • The action taken in regard to a packet that matches the policy's tuples. Actions include the following:
    • permit
    • firewall-authentication
    • tunnel ipsec-vpn vpn-name
    • pair-policy pair-policy-name
    • source-nat pool pool-name
    • pool-set pool-set-name
    • interface
    • destination-nat name
    • deny
    • reject

Index

An internal number associated with the policy.

Session log

Session log entry that indicates whether the at-create and at-close flags were set at configuration time to log session information.

Scheduler name

Name of a preconfigured scheduler whose schedule determines when the policy is active (or inactive) to check an incoming packet to determine how to treat the packet.

Policy statistics

Policy statistics include the following:

  • Input bytes—The number of bytes presented for processing by the device.
  • Output bytes—The number of bytes actually processed by the device.
  • Input packets—The number of packets presented for processing by the device.
  • Active sessions—The number of sessions currently present because of access control lookups that used this policy.
  • Session deletions—The number of sessions deleted since system startup.
  • Policy lookups—Number of times the policy was accessed to check for a match.

Sample Output

show security policies

user@host> show security policies
From zone: trust, To zone: untrust
  Policy: p1, State: enabled, Index: 4, Sequence number: 1
    Source addresses: v-2-2-2-0
    Destination addresses: v-1-1-1-0
    Applications: any
    Action: permit, log, scheduled
  Policy: p2, State: enabled, Index: 5, Sequence number: 2
    Source addresses: v-2-2-2-0
    Destination addresses: v-1-1-1-0
    Applications: any
    Action: deny, scheduled

Sample Output

sshow security policies policy-name p1 detail

user@host> show security policies policy-name p1 detail
Policy: p1, action-type: permit, State: enabled, Index: 4
  Sequence number: 1
  From zone: trust, To zone: untrust
  Source addresses:
    v-2-2-2-0: 2.2.2.0/24
  Destination addresses:
    v-1-1-1-0: 1.1.1.0/24
  Application: any
    IP protocol: 0, ALG: 0, Inactivity timeout: 0
      Source port range: [0-0]
      Destination port range: [0-0]
  Destination Address Translation: drop translated
  Session log: at-create, at-close
  Scheduler name: sch20
  Policy statistics:
    Input  bytes     :                50000                  100 bps
    Output bytes     :                40000                  100 bps
    Input  packets   :                  200                  200 pps
    Output packets   :                  100                  100 pps
    Session rate     :                    2                    1 sps
    Active sessions  :                   11
    Session deletions:                   20
    Policy lookups   :                   12

[Contents] [Prev] [Next] [Index] [Report an Error]