Configuring Security Policies for Transparent Mode

In transparent mode, security policies can be configured only between Layer 2 zones.

Before You Begin

For background information, read Understanding Security Policies in Transparent Mode.

This example configures a security policy to allow HTTP traffic from the 10.1.1.1/24 subnetwork in the l2–zone1 security zone to the server at 20.1.1.1/32 in l2–zone2.

You can use either J-Web or the CLI configuration editor to configure Layer 2 security zones.

This topic covers:

J-Web Configuration

To configure Layer 2 security policies:

  1. Select Configure>CLI Tools>Point and Click CLI.
  2. Next to Security, select Configure or Edit.
  3. Next to Policy, select the check box, and then click Configure.
  4. Next to Policy, click Add new entry.
  5. In the From zone name box, type l2–zone1.
  6. In the To zone name box, type l2–zone2.
  7. Next to Policy, click Add new entry.
  8. In the Policy name box, type p1.
  9. Select the Match check box, then click Configure.
  10. From the Source address choice list, select Source address.
  11. Next to Source address, click Add new entry.
  12. From the Value keyword list, select Enter specific value.
  13. In the Address box, type 10.1.1.1/24, and then click OK.
  14. From the Destination address choice list, select Destination address.
  15. Next to Destination address, click Add new entry.
  16. In the Value keyword list, select Enter specific value.
  17. In the Address box, type 20.1.1.1/32 , and then click OK.
  18. To match the policy to an application set name, from the Application choice list, select Application.
  19. Next to Application, click Add new entry.
  20. To specify the application set name to match the policy, in the Value keyword list box type http, and then click OK.
  21. Select the Then check box, and then click Configure.
  22. From the Action list, select Permit, and then click OK.

CLI Configuration

To configure Layer 2 security policies:

user@host# set security policies from-zone l2–zone1 to-zone l2–zone2 policy p1 match source-address 10.1.1.1/24 user@host# set security policies from-zone l2–zone1 to-zone l2–zone2 policy p1 match destination-address 20.1.1.1/32 user@host# set security policies from-zone l2–zone1 to-zone l2–zone2 policy p1 match application http user@host# set security policies from-zone l2–zone1 to-zone l2–zone2 policy p1 then permit

Related Topics