ON THIS PAGE
About the Security Policy Rules Page
Use the Security Policy Rules page to view and manage policy rules associated with devices. You can filter and sort this information to get a better understanding of what you want to configure.
Tasks You Can Perform
You can perform the following tasks from this page:
-
Create a security policy rule. See Add a Security Policy Rule.
-
Modify, clone, or delete security policy rules. See Edit, Clone, and Delete a Security Policy Rule.
-
Deploy a security policy. See Deploy Security Policies.
Search for a security policy rule. Click to search for a security policy rule. You can enter partial text or full text of the keyword in the text box. The search results are displayed on the same page.
-
Show or hide columns on the page. Hover over > Show/Hide Columns, and select the columns to show or clear the selection to hide the columns on the page.
Field Descriptions
Table 1 provides guidelines on using the fields on the Security Policy Rule page.
Field | Description |
---|---|
Seq |
The order number of the policy. The security policy lookup is performed in the order that the policies are configured. The first policy that matches the traffic is used. |
Hit Count |
The number of times a particular policy is used based on the traffic flow. The hit count is the number of hits since the last reset. For example, the hit count is especially useful when you are using a large policy set and want to verify which rules are highly used and which ones are rarely used. If you see that some of the rules are not being used, you can verify that the rules are not being shadowed by another policy. This helps you manage devices without having to generate traffic manually. |
Name |
The name of the security policy rule. |
Sources |
The source endpoint to which a security policy rule applies. A source endpoint consists of zones, addresses, and identities. |
Destinations |
The destination endpoint to which a security policy rule applies. A destination endpoint can be zones, addresses, and URL categories. |
Applications/Services |
The applications and services associated with the security policy. |
Action |
The action that applies to all traffic that matches the specified criteria.
|
Security Subscriptions |
The security subscription profiles that are applied to a security policy rule.
|
Options |
The scheduling, logging, and rule options applicable to the security policy rule. |
Deploy Status |
The deployment status. |