Security Policies Configuration Overview
You must complete the following tasks to create a security policy:
Create zones. See Example: Creating Security Zones
Configure the address book for the policy. See: Example: Configuring Address Books
Create addresses for use in the policies. See: Example: Configuring Address Books
Create an application (or application set) that indicates that the policy applies to traffic of that type. See: Example: Configuring Applications and Application Sets
Create the policy. See: Example: Configuring a Security Policy to Permit and Deny Traffic
Create schedulers if you plan to use them for your policies. See: Example: Configuring Schedulers (CLI)
Bind a policy to a schedule. See: Example: Associating a Policy to a Scheduler (CLI)
Related Topics
- JUNOS Software Feature Support Reference for SRX Series and J Series Devices
- Understanding Security Policy Rules
- Understanding Security Policy Elements
- Troubleshooting Security Policies