Select a Security Policy Rule Source
You can view and select the source end point from the complete list of zone, addresses, including the identity of such source end point.
- Click the Sources field. A list of relevant endpoints are displayed.
-
Complete the configuration according to the guidelines provided in Table 1
Table 1: Source Fields on the Security Policy Rule Page Field Description Zone
For SRX Series devices, specify a source zone (from-zone) to define the context for the policy. Zone policies are applied on traffic entering one security zone (source zone) to another security zone (destination zone).
Addresses
Enter one or more address names or address set names.
- Any—Add any address to the security policy rule.
- Specific—Select the check box beside each address you want to include in the address group. Click the greater-than icon (>) to move the selected address or addresses from the Available column to the Selected column. Note that you can use the fields at the top of each column to search for addresses. See Create Addresses or Address Groups.
Identitity
Specify the source identity to be used as match criteria for the policy. You can have different policy rules based on user roles and user groups. Click the greater-than icon (>) to move the selected user identity from the Available column to the Selected column. You can select a source identity from the available list or you can create a new identify by clicking add icon (+).
- Click OK to select the end point as a source.