Configure Application Policies on Session Smart Routers
Application policies are security policies in Juniper WAN Assurance design, where you define which network and users can access which applications, and according to which traffic steering policy. To define application policies, you must create networks, applications, and traffic-steering profiles. You then use these details as matching criteria to allow access to or block access from applications or destinations.
In the Juniper Mist™ cloud portal, the Networks or Users setting determines the source zone. The Applications + Traffic Steering setting determines the destination zone.
Notes about the application policies on the Juniper® Session Smart™ Routers :
-
You can define application policies in one of three ways: at the organization-level, inside a WAN edge template or inside a hub profile.
-
When you define an application policy at the organization-level, you can import and use the policy in multiple WAN edge templates or in hub profiles. That is, you can follow the “define once, use multiple times” model.
-
When you define an application policy directly inside a WAN edge or hub profile, the scope of the policy is limited to that WAN edge template or hub profile only. You cannot re-use the policy in other templates or profiles.
-
Mist evaluates and applies policies in the order of their appearance in the policies list.
Configure Application Policies
To configure application policies:
Reordering and Deleting Application Policies
Reordering application policy allows you to move the policies around after they have been created.
Mist evaluates policies and executes policies in the order of their appearance in the policies list, you should be aware of the following:
-
Policy order is important. Because policy evaluation starts from the top of the list,
-
New policies go to the end of the policy list.
Select a policy and use Up Arrow or Down Arrow to change the order. You can change the policy order anytime.
To delete an application policy, select the application policy you want to delete, and then click Delete that appears on the top right side of the pane.
Using Same IP Addresses/Prefixes in Networks and Applications
In the application policies configuration, Network/Users belong to the source zone, and Applications/Destination belong to the destination zone.
You can use the same IP addresses and prefixes for both networks and applications when you define them for different purposes; that is, they act as a source in one policy and as a destination in another policy.
Consider the policies in Figure 4.
Here, you have a Network/Users SPOKE-LAN1 that has an IP address 192.168.200.0/24 for a spoke LAN interface. The screenshot shows that the following policies are using the same network in different ways:
-
Spoke-to-Spoke-via-Hub—This policy allows inbound and outbound spoke-to-spoke traffic through a hub. Here, we defined SPOKE-LAN1 as both a network and as an application.
-
Spoke-to-Hub-DMZ—This policy allows spoke-to-hub traffic. Here, we defined SPOKE-LAN1 as a network.
-
Hub-DMZ-to-Spoke—This policy allows hub-to-spoke traffic. Here, we defined SPOKE-LAN1 as an application.
Monitoring Breakout Paths (Beta)
You can monitor breakout paths with the Application Routing Visibility graph on the Application Policy dashboard.
This feature is available to Beta participants only.
To improve your network monitoring experience with SSR devices, Juniper Mist switches local breakout traffic from one path to another when the path doesn’t meet the associated SLA requirements for the link latency, jitter, and loss parameters.
The SSR devices compare the SLA parameters (latency, jitter, and loss) for all the local breakout paths against the thresholds configured for these parameters for each application. Whenever a set threshold is breached (that is, a local breakout path fails to meet the associated SLA requirements), the traffic shifts to another path based on the traffic steering configuration. Any such shifts in traffic are displayed on the Application Routing Visibility graph on the Application Policy dashboard.
In the following example, you see a traffic shift from the ge-0/0/3 interface to the ge-0/0/5 interface due to an SLA threshold breach.