Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Spotlight Secure Connector Policy Overview


Policies enforce a set of rules for transit traffic, identifying which traffic can pass through the security device and the actions taken on the traffic as it passes through the security device. With Spotlight Secure Connector, you can include one or more profiles to a policy and apply them across multiple security rules. See Figure 1. If you want to test a different profile, you can modify it and it will apply across all your security rules where you have referenced this policy.

Figure 1: Example Spotlight Secure Connector Policies
Example Spotlight Secure Connector

To verify the profiles on an SRX Series device, use the show configuration CLI command or the Device Configuration View in Network Management Platform. A policy section is added as shown in the following example.

In the above example, a policy named SecIntel-Policy1 exists and contains C&C and JWAS profiles.