Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Select a Security Policy Rule Source

You can view and select the source end point from the complete list of zone, addresses, including the identity of such source end point.

  1. Click the Sources field. A list of relevant endpoints are displayed.
  2. Complete the configuration according to the guidelines provided in Table 1
    Table 1: Source Fields on the Security Policy Rule Page
    Field Description

    Zone

    For SRX Series Firewalls, specify a source zone (from-zone) to define the context for the policy. Zone policies are applied on traffic entering one security zone (source zone) to another security zone (destination zone).

    Addresses

    Enter one or more address names or address set names.

    • Any—Add any address to the security policy rule.
    • Specific—Select the check box beside each address you want to include in the address group. Click the greater-than icon (>) to move the selected address or addresses from the Available column to the Selected column. Note that you can use the fields at the top of each column to search for addresses. See Create Addresses or Address Groups.

    Identitity

    Specify the source identity to be used as match criteria for the policy. You can have different policy rules based on user roles and user groups. Click the greater-than icon (>) to move the selected user identity from the Available column to the Selected column. You can select a source identity from the available list or you can create a new identify by clicking add icon (+).

  3. Click OK to select the end point as a source.