show security application-firewall rule-set
Syntax
show security application-firewall rule-set (<rule-set-name> | all) show security application-firewall rule-set (rule-set-name | all) | (logical-system logical-system-name | all) | all-logical-systems-tenants | root-logical-system | tenant (tenant-name | all)
Description
Display information about the specified rule set defined in the application firewall.
The application firewall is defined by a collection of rule sets. A rule set defines the rules that specify match criteria, including dynamic applications, and the action to be taken for matching traffic.
Starting in Junos OS Release 18.2R1, the application firewall
(AppFW) functionality is deprecated. As a part of this change, the [edit security application-firewall]
hierarchy and all the
configuration options under this hierarchy are deprecated— rather
than immediately removed—to provide backward compatibility and
an opportunity to bring your configuration into compliance with the
new configuration.
Options
rule-set-name | Display the name of the rule set. |
all | (default) Display all rule sets for all logical systems. The user logical system administrator can display all rule sets only for the logical system they can access. |
logical-system-name | Display application firewall rule set information for a specific logical system. |
root-logical-system | Display application firewall rule set information for the root logical system (primary administrator only). |
all-logical-systems-tenants | Display application firewall rule set information for all the logical systems and tenants. |
tenant | Display application firewall rule set information for the tenant systems. |
Required Privilege Level
view
Output Fields
Table 1 lists the
output fields for the show security application-firewall rule-set
command. Output fields are listed in the approximate order in which
they appear.
Field Name |
Field Description |
---|---|
Rule-set |
Name of the rule set. |
Logical system |
Name of the logical system of the rule set. |
Tenant |
Name of the tenant system of the rule set. |
Profile |
The redirect profile to be used for rules requiring redirection for reject or deny actions. |
Rule |
Name of the rule
|
Default rule |
The default rule applied when the identified application is not specified in any rules of the rule set.
|
Number of sessions with appid pending |
Number of sessions that are pending application identification processing |
Sample Output
show security application-firewall rule-set my_ruleset1
user@host>show security application-firewall rule-set my_ruleset1 Rule-set: my_ruleset1 Rule: rule1 Dynamic Applications: junos:FACEBOOK-ACCESS, junos:YMSG Dynamic Application Groups: junos:web, junos:chat SSL-Encryption: any Action: deny or redirect Number of sessions matched: 10 Number of sessions redirected: 10 Default rule: permit Number of sessions matched: 200 Number of sessions redirected: 0 Number of sessions with appid pending: 2
Sample Output
show security application-firewall rule-set all
user@host> show security application-firewall rule-set all Rule-set: ls-product-design-rs1 Logical system: ls-product-design Rule: r1 Dynamic Applications: junos:TELNET Action:permit Number of sessions matched: 10 Default rule:deny Number of sessions matched: 100 Number of sessions with appid pending: 2 Rule-set: ls-product-design-rs1 Logical system: ls-product-design Rule: r2 Dynamic Application Groups: junos:web Action:permit Number of sessions matched: 20 Default rule:deny Number of sessions matched: 200 Number of sessions with appid pending: 4 Rule-set: ls-product-design-rs2 Logical system: ls-product-design Rule: r1 Dynamic Applications: junos:FACEBOOK-ACCESS Action:deny Number of sessions matched: 40 Default rule:permit Number of sessions matched: 400 Number of sessions with appid pending: 10
Sample Output
show security application-firewall rule-set ruleset1 tenant all
user@host> show security application-firewall rule-set ruleset1 tenant all Rule-set: ruleset1 Logical system: root-logical-system Tenant: TSYS1 Rule: rule1 Dynamic Applications: junos:HTTP, junos:FTP SSL-Encryption: any Action:permit Number of sessions matched: 0 Number of sessions redirected: 0 Default rule:permit Number of sessions matched: 0 Number of sessions redirected: 0 Number of sessions with appid pending: 0
Release Information
Command introduced in Junos OS Release 11.1. Updated in Junos OS Release 12.1X44-D10 with output format changes. Updated in Junos OS Release 12.1X45-D10 with redirection counters.
The tenant
and all-logical-systems-tenants
options are introduced in Junos OS Release 18.4R1.