ON THIS PAGE
About the Secure Edge Policy Page
To access this page, click Secure Edge > Security Policy.
A Secure Edge policy specifies what actions to take for specific sets of traffic. Use the Secure Edge Policy page to view and manage policy rules. You can filter and sort this information to get a better understanding of what you want to configure.
Policy rules are executed in the order of their appearance. You must be aware of the following:
-
Policy rules are applied from top to bottom. For example, Secure Edge policy has two rules Rule-a and Rule-b. Rule-b has sequence number 1 and the Rule-a has sequence number 2. If you deploy the policy, the rules are applied in the following sequence:
-
Rule-b
-
Rule-a
-
-
Newly created policy rules go to the end of the list.
-
If you have configured an external probe setting at Secure Edge > Service Management > External Probe, then a new policy rule is automatically created with the prefix Secure-Edge-External-Probe-Rule. The external probe rule is placed as the first rule in the order. You cannot edit, delete, or change the order of the external probe rule.
-
You can change the order of policy rules. See, Reorder a Security Policy Rule for more details.
-
The last rule in the policy list is the default policy, which has the default action of denying all traffic.
-
A policy rule can mask another policy rule.
Tasks You Can Perform
You can perform the following tasks from this page:
- Create a Secure Edge policy. See Add a Secure Edge Policy Rule
- Modify, clone, or delete a Secure Edge policy. See Edit, Clone, and Delete a Secure Edge Policy Rule
- Deploy a Secure Edge policy. See Deploy Secure Edge Policies
- Search for a Secure Edge policy. Click the search icon in the top-right corner of the page. You can enter partial text or full text of the keyword in the text box, and press Enter. The search results are displayed on the same page.
- Show or hide columns. Click the Show Hide Columns icon at the top right corner of the page.
Field Description
Table 1 provides guidelines on using the fields on the Secure Edge Policy page.
Field | Description |
---|---|
Seq | The order number for the policy. The policy lookup is performed in the order
that the policies are configured. The first policy that matches the traffic is
used. Below the sequence number, you can also see the hit count. It displays how often a particular policy is used based on traffic flow. The hit count is the number of hits since the last reset. |
Rule Name | The name of the Secure Edge policy. |
Sources | The source endpoint to which a Secure Edge policy applies. A source endpoint consists of sites, addresses, and user groups. |
Destinations | The destination endpoint to which a Secure Edge policy applies. A destination endpoint can be addresses and URL categories. |
Applications/Services | The applications and services associated with the security policy. |
Action | The action applies to all traffic that matches the specified criteria.
|
Security Subscriptions | The advanced security options are:
|
Options |
This displays scheduling, logging, and captive portal options applicable to the Secure Edge policy. The captive portal option is available only if you configure the following:
|