Using Spotlight Secure Connector Policies in Security Rules
Once you defined your policies, you can assign them to a security rule. See Figure 1. The process for adding a Spotlight Secure policy to an SRX Series device is basically the same as any other policy. See Firewall Policies Overview and Adding Rules to a Firewall Policy.
After the rule is added, you define the action (permit, deny, reject, and so forth) taken on the traffic as it passes through the security device. See Figure 2.
Use the Security Intelligence column to specify the Spotlight Secure policy to attach to this rule. See Figure 3.
Finally, publish the policy to the SRX Series device. See Figure 4.
You can view what is being published to the security device through the CLI Configuration window. See Figure 5.