Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Using Spotlight Secure Connector Policies in Security Rules

 

Once you defined your policies, you can assign them to a security rule. See Figure 1. The process for adding a Spotlight Secure policy to an SRX Series device is basically the same as any other policy. See Firewall Policies Overview and Adding Rules to a Firewall Policy.

Figure 1: Assigning Spotlight Secure Policies to a Security Rule
Assigning Spotlight Secure
Policies to a Security Rule

After the rule is added, you define the action (permit, deny, reject, and so forth) taken on the traffic as it passes through the security device. See Figure 2.

Figure 2: Defining the Rule Action
Defining the Rule Action

Use the Security Intelligence column to specify the Spotlight Secure policy to attach to this rule. See Figure 3.

Figure 3: Assigning the Spotlight Secure Policy to the Rule
Assigning the Spotlight Secure
Policy to the Rule

Finally, publish the policy to the SRX Series device. See Figure 4.

Figure 4: Publishing a Rule
Publishing a Rule


You can view what is being published to the security device through the CLI Configuration window. See Figure 5.

Figure 5: Viewing the Policies Pushed to the Security Device
Viewing the Policies Pushed
to the Security Device

Related Documentation