Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Example: Configuring a Next-Generation Firewall on SRX Series Devices

 

This example provides step-by-step procedures required for configuring a next-generation firewall for a medium-size enterprise campus.

Hardware and Software Requirements

The following SRX Series devices running Junos® OS Release 12.1X47 or later are used in this example:

  • Branch-1: One Juniper Networks SRX Series Services Gateway (SRX210) operating in Layer 2 transparent mode

  • Branch-2: One Juniper Networks SRX Series Services Gateway (SRX210) operating in chassis cluster mode

  • Data Center and Headquarters: Juniper Networks SRX Series Services Gateways (SRX240 and SRX550)

Before you begin, complete the basic configuration for your SRX Series device.

This configuration example is created and tested using SRX210 Services device with Junos® OS Release 12.1X47. See the following documents for the latest updates on configuring the features:

Overview and Topology

Figure 1 shows the basic topology used in the midsize enterprise campus solution. This topology was chosen to provide a general and flexible example that can be modified to apply to different enterprise vertical markets and physical facilities.

Figure 1: Enterprise Campus Solution Topology
Enterprise
Campus Solution Topology

In this topology, the following three physical locations are defined:

  • Branch-1: Low to medium-density location that is geographically separate from the location of the headquarters (HQ) and the other branch.

    • The SRX Series device is placed between the internal core switch and the Internet edge router.

    • Each user will be authenticated by Firewall User Authentication (integrated user firewall authentication).

  • Branch-2: Low to medium-density location that is geographically separate from HQ and the other branch.

    • The external edge router is in chassis cluster mode with integrated firewall configured.

    • Users from each division will be authenticated by Unified Access Controller (UAC) with specific roles to secure the network and to ensure that only authenticated users can access the protected host in the data center.

  • Headquarters/Data Center: High-density location that serves as the campus network core.

    • The data center is provided with chassis redundancy along with ISP. Two-gigabit interfaces are used as aggregated interfaces for configuring the RETH interface.

    • The data center hosts some real-time servers such as FTP, HTTP, MySQL, Syslog Server/STRM, and so on in the DMZ zone.

    • Users need to access data center servers through dynamic VPN, and some other users need to be authenticated by UAC (contacting IC series devices over SSL). For more information on IC Series, see IC Series.

To illustrate a common configuration scenario, the following design assumptions are made for all three locations (Branch-1, Branch-2, and data center):

  • Site-to-site IPsec tunnel is configured between the branches and DC/HQ.

  • All three locations have dual links to two different ISPs to provide redundancy.

The SRX Series device is responsible for identifying and taking accurate action for the traffic flowing between:

  • Individual branches to the Internet

  • Individual branches to a HQ/data center

  • Between the branches (Branch-1 and Branch-2)

To configure the next-generation firewall:

Note

This example shows a minimal configuration involving only a few users and selected features, and applications.

  1. Configure address objects.

    An address book is a collection of addresses and address sets. Address books are referenced in security policies. Address book entries include addresses of hosts and subnets whose traffic is either allowed, blocked, encrypted, or user-authenticated.

  2. Configure security policies to enforce rules for transit traffic, in terms of what traffic can pass through the firewall, and the actions that need to take place on traffic as it passes through the firewall.

    A security policy controls the traffic flow from one zone to another zone by defining the kinds of traffic permitted from specified IP sources to specified IP destinations.

    Each user has following security policies created for the following requirements:

    • For accessing the servers in the data center (e-mail servers, FTP servers, and HTTP servers)

    • For accessing the Internet (multiple social sites, P2P applications, and other standard applications)

  3. Identify the traffic at different network layers using AppID.

    Once the application is determined, apply AppSecure service modules to monitor and control traffic for tracking, prioritization, access control, detection, and prevention based on the application ID of the traffic.

  4. Enable IDP services and activate the predefined Recommended policy as the active policy.

  5. Configure UTM to provide security features on the device to protect against multiple threat types.

  6. Configure Screen to protect from DDOS attack.

    Configure Screen options to protect against internal and external attacks.

  7. Configure the integrated user firewall authentication on devices for domain and non-domain users to provide access to the Internet through an SRX Series device.

  8. Configure SSL proxy for secure transmission of data by using the encryption technology.

Configuring Address Objects, Security Zones, and Security Policies

A security policy controls the traffic flow from one zone to another zone by defining the kinds of traffic permitted from specified IP sources to specified IP destinations.

As a first step, set up a new zone and add three servers to that zone. Then provide communication between a host (PC) in the trust zone (in the branch office) to the servers in the newly created zone (HQ). Then create an interzone security policy to allow traffic between the two zones.

Table 1 provides specific configuration parameters used in creating address objects.

Table 1: Address Book Configuration Parameters

Host

IP Address

Address Book

Zones

Branch-1

branch-1-user-1

192.168.2.2/24

address-book-branch-1-users

Branch1-Zone

branch-1-user-2

192.168.2.3/24

branch-1-user-3

192.168.2.4/24

Branch-2

branch-2-user-1

192.168.1.2/24

address-book-branch-2-users

Branch2-Zone

branch-2-user-2

192.168.1.3/24

branch-2-user-3

192.168.1.4/24

Table 2 provides specific configuration parameters used in creating security policies.

Table 2: Security Policy Configuration Parameters

Location

Purpose

Policy Name

From Zone

To Zone

Branch-1

Access the servers in the HQ (e-mail servers, FTP servers and HTTP servers, and so on).

Branch1-policy

Branch1-Zone

HQ-Zone

Access the Internet.

permit-traffic-branch-1-to-internet

Branch1-Zone

untrust

Branch-2

Access the servers in the HQ (e-mail servers, FTP servers and HTTP servers, and so on).

Branch2-policy

Branch2-Zone

HQ-Zone

Access the Internet.

permit-traffic-branch-2-to-internet

Branch2-Zone

untrust

For more information, see the Security Building Blocks Feature Guide.

Configuring Security Zone for Headquarters

Step-by-Step Procedure

To configure security zones for Headquarters:

  1. Configure a security zone HQ-Zone and configure it to support inbound traffic for all system services.
  2. Enable AppTrack for the security zone.

Configuring Security Zones, Address Objects, and Security Policies on Branch-1

Step-by-Step Procedure

To configure security zones and policies for Branch-1 users:

  1. Configure a security zone Branch1-Zone and configure it to support inbound traffic for all system services.
  2. Create an address book, define addresses in it, and attach it to a security zone.
  3. Configure a specific security policy to allow traffic from a host in the Branch1-Zone zone to a server in the HQ-Zone zone.

Configuring Security Zones, Address Objects, and Security Policies on Branch-2

Step-by-Step Procedure

To configure security zones and policies for Branch-2 users:

  1. Configure a security zone Branch2-Zone and configure it to support inbound traffic for all system services.
  2. Create an address book, define addresses in it, and attach it to a security zone.
  3. Configure a specific security policy to allow traffic from a host in the Branch2-Zone zone to a server in the HQ-Zone zone.

Configuring AppSecure Modules

Configure application identification to recognize traffic at different network layers using characteristics other than port number. Once the application is determined, configure application tracking, application firewall, and application quality of service to monitor and control traffic for tracking, prioritization, access control, detection, and prevention based on the application ID of the traffic.

For more information, see the AppSecure Services Feature Guide for Security Devices.

In this procedure, you perform the following tasks:

  • Download, install, and enable application identification.

  • Configure Apptrack and enable it in the zone “Branch1-Zone”. The first log message is to be generated when the session starts, and update messages should be sent every 4 minutes after that. A final message should be sent at session end.

  • Add the remote syslog device configuration to receive AppTrack log messages in sd-syslog format.

  • Define application firewall rulesets. Permit or deny selected traffic from the untrust zone to the trust zone, based on the application firewall rule sets defined with the rules matching the dynamic applications. Here, you are defining the rules to perform following tasks:

    • Allow access to FTP, HTTP, POP3, IMAP, and SMTP.

    • Block certain application traffic such as Yahoo and Facebook and other social networking sites.

  • Implement AppQoS to classify the incoming packets based on the various protocols and further prioritize and rate limit the packets.

Note

The procedure to configure AppSecure modules is same for both branches. The following examples show configuration steps on Branch-1 only.



The following procedures show how to configure AppSecure modules on Branch-1. You can use the same procedure for other branches.

Installing the Application Identification License

Step-by-Step Procedure

You can install the license on the SRX Series device using either the automatic method or manual method as follows:

  1. Install your license on the device.

    To install or update your license automatically, your device must be connected to the Internet.

    • Update the license automatically on the device.

    • Install the license manually on the device.

      Paste the license key and press Enter to continue.

  2. Verify that the license is installed on your device.

    Use the show system license command to view license usage, as shown in the following example:

    The output sample is truncated to display only license usage details.

Installing the Application Signature Package

Step-by-Step Procedure

To install the application signature package:

  1. Download the application package.

    The download retrieves the application package from the Juniper Networks security website https://signatures.juniper.net/cgi-bin/index.cgi.

    You can download and install application signatures through intrusion detection and prevention (IDP) security packages using the request security idp security-package download command.

  2. Check the download status.
    Note

    You can also use the system log to view the result of the download.

  3. Install the application package.

    The application package is installed in the application signature database on the device.

  4. Check the installation status of the application package.
  5. After successful download and installation of the application package, use the following commands to view the predefined application signature package content:
    • View the current version of the application package:

    • View the current status of the application package:

Configuring AppTrack for Application Visibility and Control

Step-by-Step Procedure

To configure AppTrack:

  1. Add the remote syslog device configuration to receive Apptrack messages in sd-syslog format.
  2. Enable AppTrack for the security zone Branch1-Zone.
  3. (Optional) Generate update messages every 4 minutes.
  4. (Optional) Generate the first message when the session starts.

    Once the first message has been generated, an update message is generated each time the session update interval is reached.

Configuring Application Firewall Rule Sets for Application Enforcement

Step-by-Step Procedure

To configure the security policy with application firewall rule sets that permit or deny traffic from different dynamic applications:

  1. Create an allowlist to permit certain applications.
  2. Create a blocklist to deny certain applications.
  3. Create a default rule to permit all application traffic that does not match one of the rules.
  4. Configure a security policy to apply the application firewall rule set.

    In this example, policy Branch1-policy applies the rule set phase1 to all traffic from the Branch1-Zone zone to the HQ-Zone zone.

Configuring AppQoS to Prioritize Marking and Rate Limiting of Application Traffic

Step-by-Step Procedure

To configure an AppQoS implementation:

  1. Define one or more forwarding classes dedicated to AppQoS marking.

    In this example, a single forwarding class, my-app-fc, is defined and assigned to queue 0.

  2. Define rate limiters.

    In this example, two rate limiters are defined:

    • test-r1 with a bandwidth of 100 Kbps and a burst limit of 13,000 bytes

    • test-r2 with a bandwidth of 200 Kbps and a burst limit of 26,000 bytes

  3. Define AppQos rules and application match criteria.

    For this example, rule 0 in rule set ftp-test1 is applied to junos:FTP packets.

  4. Define the action for rule 0 when it encounters a junos:FTP packet.

    In this example, when a match is made, the packet is marked with the forwarding class my-app-fc, the DSCP value of af22, and a loss priority of low.

  5. Assign rate limiters for rule 0 to traffic in each direction.

    In this case, the rate limiter test-r1 is set in both directions.

    Note

    Rate limiter test-r1 can be assigned to one or both traffic directions in rule 0. It could also be assigned in other rules within rule set ftp-test1. However, once test-r1 is assigned to rule set ftp-test1, it cannot be assigned in any other rule set.

  6. Log the AppQoS event whenever this action as defined in rule 0 is triggered:
  7. Define other rules to handle application packets that did not match the previous rule.

    In this example, following rule (rule 1) applies to all remaining applications:

  8. Assign rate limiters for the second rule.

    In this example, any traffic that is not from FTP is assigned rate limiter test-r2 in both directions.

  9. Add the AppQoS implementation to a policy.

    In this example, policy Branch1-policy applies the rule set ftp-test1 to all traffic from the Branch1-Zone zone to the HQ-Zone zone.

Configuring IDP

Configure the Intrusion detection and prevention (IDP) feature to selectively enforce various attack detection and prevention techniques on network traffic passing through an IDP-enabled device.

As a first step, download and install the signature database from the Juniper Networks website. Next, download and install the predefined IDP policy templates and activate the predefined policy “Client-And-Server-Protection” as the active policy. Next, enable the security policy for IDP inspection.

For more information, see the Intrusion Detection and Prevention Guide for Security Devices.

Enabling IDP in a Security Policy

Step-by-Step Procedure

The following procedure shows how to configure IDP on Branch-1. You can use the same procedure for other branches.

To configure IDP on Branch-1:

  1. Download the security package.
    Note

    Downloading the database might take some time depending on the database size and the speed of your Internet connection.

  2. Check the security package download status.
  3. Install the security package.
    Note

    Installing the attack database might take some time depending on the security package size.

  4. Check the attack database install status.

    The command output displays information about the downloaded and installed versions of the attack database.

  5. Confirm your IDP security package version.
  6. Download the predefined IDP policy templates.
  7. Check the security package download status.
  8. Install the IDP policy templates.
  9. Verify the installation status update.
  10. Enable the templates.xsl scripts file.

    On commit, the Junos OS management process (mgd) looks in templates.xsl and installs the required policy.

  11. Commit the configuration.

    The downloaded templates are saved to the Junos OS configuration database, and they are available in the CLI at the [edit security idp idp-policy] hierarchy level.

  12. Display the list of downloaded templates.

    For more information about predefined IDP policy templates, see Understanding Predefined IDP Policy Templates.

  13. Activate the predefined Client-And-Server-Protection policy as the active policy.
  14. Confirm the active policy enabled on your device.
  15. Enable the security policy for IDP inspection.

Configuring Unified Threat Management

Configure UTM to protect your device against multiple threat types.

In this procedure, you define custom objects, configure feature profiles for UTM components (antispam, antivirus, and Web filtering), configure a UTM policy and attach feature profiles, and apply the UTM policy to the security policy as an application service.

For more information, see the Junos OS UTM Library for Security Devices.

Note

You must confirm UTM licenses on your device before you start configuring the UTM feature.

Table 3 provides the list of configuration parameters used to configure antispam, antivirus, and Web filtering in this example.

Table 3: UTM Components Configuration Parameters

Parameter

Value

Custom objects

URL pattern:

  • blocklists

  • allowlists

  • urllistblack

MIME pattern:

  • block-mime-list

Filename extension:

  • block-extension-list

Custom URL category:

  • blocklist

Protocol command:

  • permit-command-list

  • block-command-list

Antivirus feature profile

fav_profile

Antivirus type

kaspersky-lab-engine

Antispam sbl profile

as_smtp

Web filtering- surf control integrated profile

wf_cpa

SHS-Policy-1

Web filtering-websense redirect profile

wf_ws

Content filter profile

CF

UTM policy

utm_p1

Security policy

utm_p1

Configuring UTM Components

Step-by-Step Procedure

The following procedure shows how to configure UTM on Branch-1. You can use the same procedure for other branches.

To configure antispam, antivirus, content filtering, and Web filtering:

  1. Configure the antivirus feature profile.
  2. Configure custom objects for the antispam feature profile.
  3. Configure the antispam feature profile.
  4. Configure custom objects for the Web filtering feature profile.
  5. Configure the integrated Web filtering feature profile.
  6. Select an action (permit, log and permit, block) for this profile for requests that experience errors.
  7. Select a default action (block) for this profile for requests that experience errors, and configure a custom message to be sent when HTTP requests are blocked.
  8. Select fallback settings (block or log and permit) for this profile.
  9. Configure the Web filtering feature profile (redirect).
  10. Configure custom objects for the content filtering profile.
  11. Configure the content filtering feature profile.
  12. Create a UTM policy and apply the antivirus profile to the UTM policy.
  13. Apply the antispam profile to the UTM policy.
  14. Apply the content filtering profile to the UTM policy.
  15. Apply the Web filtering profile to the UTM policy.
  16. Configure traffic options for the UTM policy.
  17. Attach the UTM policy to the security policy Branch1-Zone (policy from the Branch1-Zone zone to HQ-Zone untrust zone), and set the application services to be allowed.

Configuring Screens

Configure the following screen options to secure the zone by inspecting and then allowing or denying all the inter-zone traffic that would be inspected by the screen feature:

  • Reconnaissance attacks (IP spoofing, IP source route option)

  • Denial-of-service attacks (ICMP flood, UDP flood, syn flood, ping of death, tear drop, land)

  • Suspicious packet attributes (bad IP options, unknown protocols)

After configuring screen options, you must enable screens in the zone.

For more information, see the Junos OS Attack Detection and Prevention Library for Security Devices.

Configuring Multiple Screening Options

Step-by-Step Procedure

The following procedure shows how to configure screen options on Branch-1. You can use the same procedure for other branches.

To configure screen options:

  1. Configure protection against an ICMP flood attack.
  2. Configure protection against the ping of death, an OS-targeted attack.
  3. Configure the IP bad option screen to block large ICMP packets.
  4. Configure to detect packets with timestamp options.
  5. Configure to block IP spoof attacks.
  6. Configure to block packets with the source route option set.
  7. Configure the unknown protocol screen to block packets with an unknown protocol.
  8. Configure protection against a teardrop attack.
  9. Configure the zone-syn-flood protection screen option, and set the timeout value to 20.
  10. Enable protection against a land attack.
  11. Enable UDP flood protection.
  12. Enable the screen in the security zone.

Configuring Firewall User Authentication

The integrated user firewall feature introduces an authentication source through integration with Microsoft Active Directory technology. This feature enforces user-based and group-based policy control over traffic.

Configure the integrated user firewall feature by configuring a Windows Active Directory domain, an LDAP base, unauthenticated users to be directed to a captive portal, and a security policy based on a source identity.

For more information, see the Authentication and Integrated User Firewalls Feature Guide for Security Devices.

Table 4 provides the domain and domain controller parameters used in establishing a Windows Active Directory domain.

Table 4: Domain and Domain Controllers Parameters

Parameter

Value

Description

Configure Active Directory Access domain name

example.net

Specify domain name to which the query is to be added.

LDAP base distinguished name (DN)

dc=example,dc=net.

Base DN is the starting point where the system starts searching for the user.

Domain controller name and IP address

DC-1

192.0.2.15

The IP address of the domain controller (server).

User name

admin

The user ID used to access the domain controller.

Password

welcome

Enter the password for the account used to access the DC.

Table 5 provides the domain and domain controller parameters used in configuring a captive portal.

Table 5: Captive Portal Configuration Parameters

Parameter

Value

Description

Base distinguished name

DC=acme,DC=nonexample,DC=net

Base DN is the starting point where the searching for the user starts.

Search filter

cn=

Search filter is used to fine search the user groups. The Filter used for group search will be cn=.

cn is the default, and is used by most LDAP servers.

Server IP address

192.0.2.3

LDAP server’s IP address.

LDAP administrator name

administrator

LDAP administrator’s distinguished name.

LDAP administrator password

password123

LDAP administrator’s password.

Configuring Integrated User Firewall Authentication

Step-by-Step Procedure

The following procedure shows how to configure user authentication on Branch-1. You can use the same procedure for other branches.

To integrate user firewall authentication:

  1. Configure the LDAP base distinguished name.
  2. Create the access profile profile1 for the users, configure a domain name, the username and password of the domain, and the name and IP address of the domain controller in the domain.
  3. Configure a policy for the source-identity, unauthenticated user, and enable the firewall authentication captive portal.
  4. Configure a second policy to enable a specific user.

Configuring SSL Proxy

In this procedure, you must generate and update the root CA certificate. Next, you will configure an SSL proxy profile and apply the root CA certificate and CA profile groups to the SSL proxy profile. Finally, you will configure the SSL proxy on a security policy.

You can configure additional services such as AppFW or IPS to provide granular inspection.

For more information, see Configuring SSL Proxy.

Configuring SSL Proxy

Step-by-Step Procedure

The following procedure shows how to configure an SSL proxy on Branch-1. You can use the same procedure for other branches.

To generate a root CA certificate using the Junos OS CLI, follow these steps on an SRX Series device:

  1. From operational mode, generate a PKI public/private key pair for a local digital certificate.
  2. From operational mode, define a self-signed certificate.
  3. From configuration mode, apply the loaded certificate as root-ca in the SSL proxy profile.
  4. Specify to ignore server authentication.

    Junos OS provides the following options for trusted CA certificates:

    • Loading the default trusted CA list

    • Importing the trusted CA list manually

    • Ignoring server authentication

    For more information, see Configuring SSL Proxy.

    This example uses the Ignoring server authentication method.

    In this method, any errors encountered during server certificate verification at the time of the SSL handshake are ignored. We do not recommend using this option for authentication because configuring it results in websites not being authenticated at all. However, you can use this option to effectively identify the root cause of dropped SSL sessions.

  5. Configure an option to receive the logs.

    SSL proxy logs contain the logical system name, SSL proxy allowlists, policy information, SSL proxy information, and other information that helps you troubleshoot when there is an error.

  6. Create a security policy and specify the match criteria for the policy.

    For match criteria, specify the traffic for which you want to enable the SSL proxy.

  7. Apply the SSL proxy profile to the security policy.

Verification

Confirm that the configuration is working properly.

Verifying the Security Policy Configuration

Purpose

Verify that the security policy is configured correctly on the branch office.

Action

From operational mode, enter the show security policies command to display details about the policy configured on the device.

user@host> show security policies from-zone Branch1-Zone to-zone HQ-Zone detail

Meaning

The output displays information about the Branch1-policy policy configured on the system. Verify the following information:

  • From and To zones

  • Intrusion Detection and Prevention

  • Unified Threat Management

  • Application firewall

  • Application traffic control

Verifying the Security Policy for User Authentication

Purpose

Verify that integrated user firewall authentication is configured correctly on the branch office.

Action

From operational mode, enter the show security policies command to display details about the policy configured on the device.

user@host> show security policies from-zone Branch1-Zone to-zone untrust detail

Meaning

The output displays information about the policy permit-traffic-branch-1-to-internet configured on the system. Verify the following information:

  • From and To zones

  • Source identities

Verifying the IDS Profile for Screening Options

Purpose

Verify that the configuration for multiple screening options is configured properly.

Action

From operational mode, enter the show security screen ids-option command to display details about the configured screen options on the device.

user@host> show security screen ids-option UTrust

Meaning

The output displays information about the screen options details configured on the system.

Verifying Application Statistics

Purpose

View the application usage statistics.

Action

From operational mode, enter the show services application-identification statistics applications command.

user@host> show services application-identification statistics applications

Meaning

The output displays information about the cumulative session and byte statistics per application.

Verifying AppQoS Session Statistics

Purpose

Verify that AppQoS session statistics are being accumulated at each egress node.

Action

From operational mode, enter the show class-of-service application-traffic-control counter command.

user@host> show class-of-service application-traffic-control counter

Meaning

The output displays information about the AppQoS DSCP marking and honoring statistics based on layer-7 application classifiers.

Verifying AppTrack Counter Values

Purpose

View the AppTrack counters periodically to monitor logging activity.

Action

From operational mode, enter the show security application-tracking counters command.

user@host> show security application-tracking counters

Meaning

The output displays information about the status of AppTrack counters.

Note

The following output shows a sample syslog message of the AppTrack log:

Verifying the Antivirus Protection Configuration

Purpose

Verify that the antivirus protection configuration is working properly.

Action

From operational mode, enter the show security utm anti-virus status command.

user@host> show security utm anti-virus status

Meaning

The output displays information about antivirus status for connections including clean and infected files and scan engine status.

Verifying the Antispam Protection Configuration

Purpose

Verify that the antispam protection configuration is working properly.

Action

From operational mode, enter the show security utm anti-spam status and show security utm anti-spam statistics commands.

user@host> show security utm anti-spam status

Meaning

The output displays information about antispam status for connections including allowlist and blocklist server information

Verifying the Content Filtering Protection Configuration

Purpose

Verify that the content filtering configuration is working properly.

Action

From operational mode, enter the show security utm content-filtering statistics and show security utm anti-spam statistics commands.

user@host> show security utm content-filtering statistics

Meaning

The output displays content-filtering statistics for connections including lists of blocked files and the reasons for blocking.

Verifying the Web Filtering Protection Configuration

Purpose

Verify that the Web filtering configuration is working properly.

Action

From operational mode, enter the show security utm web-filtering status and show security utm web-filtering statistics commands.

user@host> show security utm web-filtering status
user@host> show security utm web-filtering statistics

Meaning

The output of show security utm web-filtering status displays whether the Web filtering server connection is up or not.

The output of show security utm web-filtering statistics displays Web filtering statistics for connections including allowlist and blocklist hits and custom category hits.

Verifying the SSL Proxy Configuration

Purpose

View the SSL proxy statistics.

Action

From operational mode, enter the show services ssl proxy statistics command.

user@host> show services ssl proxy statistics

Meaning

The output displays information about the number of proxy sessions that are matched, allowlisted, bypassed, created, dropped, active, and ignored.