Configure Application Policies on SRX Series Firewalls
Application policies are security policies in Juniper WAN Assurance design, where you define which network and users can access which applications, and according to which traffic steering policy. To define application policies, you must create networks, applications, and traffic-steering profiles. You then use these details as matching criteria to allow access to or or block access from applications or destinations.
In the Juniper Mist™ cloud portal, the Networks or Users setting determines the source zone. The Applications + Traffic Steering setting determines the destination zone. Traffic-steering paths determine the destination zone in Juniper Networks® SRX Series Firewalls, so ensure that you assign traffic steering profiles to the application policies.
Notes about the application policies:
-
You can define application policies in one of three ways: at the organization-level, inside a WAN edge template or inside a hub profile.
-
When you define an application policy at the organization-level, you can import and use the policy in multiple WAN edge templates or in hub profiles. That is, you can follow the “define once, use multiple times” model.
-
When you define an application policy directly inside a WAN edge or hub profile, the scope of the policy is limited to that WAN edge template or hub profile only. You cannot re-use the policy in other templates or profiles.
-
Mist evaluates and applies policies in the order of their appearance in the policies list.
Configure Application Policies
To configure application policies:
Reorder and Delete Application Policies
Reordering application policy allows you to move the policies around after they have been created.
Mist evaluates policies and executes policies in the order of their appearance in the policies list, you should be aware of the following:
-
Policy order is important. Because policy evaluation starts from the top of the list,
-
New policies go to the end of the policy list.
Select a policy and use Up Arrow or Down Arrow to change the order. You can change the policy order anytime.
To delete an application policy, select the application policy you want to delete, and then click Delete that appears on the top right side of the pane.
Using Same IP Addresses and Prefixes in Networks and Applications
In the application policies configuration, Network/Users belong to the source zone, and Applications/Destination belong to the destination zone.
You can use the same IP addresses and prefixes for both networks and applications when you define them for different purposes; that is, they act as a source in one policy and as a destination in another policy.
Consider the policies in Figure 4.
Here, you have a Network/Users SPOKE-LAN1 that has an IP address 192.168.200.0/24 for a spoke LAN interface. The screenshot shows that the following policies are using the same network in different ways:
-
Spoke-to-Spoke-via-Hub—This policy allows inbound and outbound spoke-to-spoke traffic through a hub. Here, we defined SPOKE-LAN1 as both a network and as an application.
-
Spoke-to-Hub-DMZ—This policy allows spoke-to-hub traffic. Here, we defined SPOKE-LAN1 as a network.
-
Hub-DMZ-to-Spoke—This policy allows hub-to-spoke traffic. Here, we defined SPOKE-LAN1 as an application.