show security application-firewall rule-set
Syntax
show security application-firewall rule-set (<rule-set-name> | all) show security application-firewall rule-set (rule-set-name | all) | (logical-system logical-system-name | all) | all-logical-systems-tenants | root-logical-system | tenant (tenant-name | all)
Description
Display information about the specified rule set defined in the application firewall.
The application firewall is defined by a collection of rule sets. A rule set defines the rules that specify match criteria, including dynamic applications, and the action to be taken for matching traffic.
Starting in Junos OS Release 18.2R1, the application firewall
(AppFW) functionality is deprecated. As a part of this change, the [edit security application-firewall] hierarchy and all the
configuration options under this hierarchy are deprecated— rather
than immediately removed—to provide backward compatibility and
an opportunity to bring your configuration into compliance with the
new configuration.
Options
| rule-set-name | Display the name of the rule set. |
| all | (default) Display all rule sets for all logical systems. The user logical system administrator can display all rule sets only for the logical system they can access. |
| logical-system-name | Display application firewall rule set information for a specific logical system. |
| root-logical-system | Display application firewall rule set information for the root logical system (primary administrator only). |
| all-logical-systems-tenants | Display application firewall rule set information for all the logical systems and tenants. |
| tenant | Display application firewall rule set information for the tenant systems. |
Required Privilege Level
view
Output Fields
Table 1 lists the
output fields for the show security application-firewall rule-set command. Output fields are listed in the approximate order in which
they appear.
Field Name |
Field Description |
|---|---|
Rule-set |
Name of the rule set. |
Logical system |
Name of the logical system of the rule set. |
Tenant |
Name of the tenant system of the rule set. |
Profile |
The redirect profile to be used for rules requiring redirection for reject or deny actions. |
Rule |
Name of the rule
|
Default rule |
The default rule applied when the identified application is not specified in any rules of the rule set.
|
Number of sessions with appid pending |
Number of sessions that are pending application identification processing |
Sample Output
show security application-firewall rule-set my_ruleset1
user@host>show security application-firewall rule-set my_ruleset1
Rule-set: my_ruleset1
Rule: rule1
Dynamic Applications: junos:FACEBOOK-ACCESS, junos:YMSG
Dynamic Application Groups: junos:web, junos:chat
SSL-Encryption: any
Action: deny or redirect
Number of sessions matched: 10
Number of sessions redirected: 10
Default rule: permit
Number of sessions matched: 200
Number of sessions redirected: 0
Number of sessions with appid pending: 2
Sample Output
show security application-firewall rule-set all
user@host> show security application-firewall rule-set all
Rule-set: ls-product-design-rs1
Logical system: ls-product-design
Rule: r1
Dynamic Applications: junos:TELNET
Action:permit
Number of sessions matched: 10
Default rule:deny
Number of sessions matched: 100
Number of sessions with appid pending: 2
Rule-set: ls-product-design-rs1
Logical system: ls-product-design
Rule: r2
Dynamic Application Groups: junos:web
Action:permit
Number of sessions matched: 20
Default rule:deny
Number of sessions matched: 200
Number of sessions with appid pending: 4
Rule-set: ls-product-design-rs2
Logical system: ls-product-design
Rule: r1
Dynamic Applications: junos:FACEBOOK-ACCESS
Action:deny
Number of sessions matched: 40
Default rule:permit
Number of sessions matched: 400
Number of sessions with appid pending: 10
Sample Output
show security application-firewall rule-set ruleset1 tenant all
user@host> show security application-firewall rule-set ruleset1 tenant all
Rule-set: ruleset1
Logical system: root-logical-system
Tenant: TSYS1
Rule: rule1
Dynamic Applications: junos:HTTP, junos:FTP
SSL-Encryption: any
Action:permit
Number of sessions matched: 0
Number of sessions redirected: 0
Default rule:permit
Number of sessions matched: 0
Number of sessions redirected: 0
Number of sessions with appid pending: 0Release Information
Command introduced in Junos OS Release 11.1. Updated in Junos OS Release 12.1X44-D10 with output format changes. Updated in Junos OS Release 12.1X45-D10 with redirection counters.
The tenant and all-logical-systems-tenants options are introduced in Junos OS Release 18.4R1.