Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Policy Enforcer Overview

    Policy Enforcer provides centralized, integrated management of all your security devices (both physical and virtual), giving you the ability to combine threat intelligence from different solutions and act on that intelligence from one management point.

    It also automates the enforcement of security policies across the network and quarantines infected endpoints to prevent threats across firewalls and switches. It works with cloud-based Sky Advanced Threat Prevention (Sky ATP) to protect both perimeter-oriented threats as well as threats within the network. For example, if a user downloads a file from the Internet and that file passes through an SRX firewall, the file can be sent to the Sky ATP cloud for malware inspection (depending on your configuration settings.) If the file is determined to be malware, Policy Enforcer identifies the IP address and MAC address of the host that downloaded the file. Based on a user-defined policy, that host can be put into a quarantine VLAN or blocked from accessing the Internet.

    Policy Enforcer provides the following:

    • Pervasive Security—Combine security features and intelligence from devices across your network, including switches, routers, firewalls, to create a “secure fabric” that leverages information you can use to create policies that address threats in real-time and into the future. With monitoring capabilities, it can also act as a sensor, providing visibility for intra- and inter-network communications.
    • User Intent-Based Policies—Create policies according to logical business structures such as users, user groups, geographical locations, sites, tenants, applications, or threat risks. This allows network devices (switches, routers, firewalls and other security devices) to share information, resources, and when threats are detected, remediation actions within the network.
    • Threat Intelligence Aggregation—Gather threat information from multiple locations and devices, both physical and virtual, as well as third party solutions.

    Figure 1 illustrates the flow diagram of Policy Enforcer over a traditional SRX configuration.

    Figure 1: Comparing Traditional SRX Customers to Policy Enforcer Customers

    Comparing Traditional SRX Customers
to Policy Enforcer Customers

    Supported Topologies

    Policy Enforcer supports the following topologies:

    • Client to Layer 2 switch to Layer 3 SRX (IRB)
    • Client to Layer 2 switch to Layer 3 switch (IRB)
    • Client to Layer 2/Layer 3 switch (IRB)

    Modified: 2017-07-21