Security Policies Configuration Overview
You must complete the following tasks to create a security policy:
Create zones. See Example: Creating Security Zones
Configure an address book with addresses for the policy. See Example: Configuring Address Books
Create an application (or application set) that indicates that the policy applies to traffic of that type. See Example: Configuring Applications and Application Sets
Create the policy. See Example: Configuring a Security Policy to Permit or Deny All Traffic and Example: Configuring a Security Policy to Permit or Deny Selected Traffic
Create schedulers if you plan to use them for your policies. See Example: Configuring Schedulers (CLI)
Bind a policy to a scheduler. See Example: Associating a Policy to a Scheduler (CLI)
Related Topics
- Junos OS Feature Support Reference for SRX Series and J Series Devices
- Understanding Security Policy Rules
- Understanding Security Policy Elements
- Troubleshooting Security Policies
Hide Navigation Pane
Show Navigation Pane
Download
SHA1