Security Policy Rules Overview
Use the Security Policy Rules page to view and manage policy rules associated with devices. You can filter and sort this information to get a better understanding of what you want to configure. To access this page, click SRX > Security Policy > SRX Policy and click the security policy rule.
Field Descriptions
Field | Description |
---|---|
Seq |
The order number of the policy. The security policy lookup is performed in the order that the policies are configured. The first policy that matches the traffic is used. |
Hit Count |
The number of times a particular policy is used based on the traffic flow. The hit count is the number of hits since the last reset. For example, the hit count is especially useful when you are using a large policy set and want to verify which rules are highly used and which ones are rarely used. If you see that some of the rules are not being used, you can verify that the rules are not being shadowed by another policy. This helps you manage devices without having to generate traffic manually. |
Name |
The name of the security policy rule. |
Sources |
The source endpoint to which a security policy rule applies. A source endpoint consists of zones, addresses, and identities. |
Destinations |
The destination endpoint to which a security policy rule applies. A destination endpoint can be zones, addresses, and URL categories. |
Applications/Services |
The applications and services associated with the security policy. |
Action |
The action that applies to all traffic that matches the specified criteria.
|
Security Subscriptions |
The security subscription profiles that are applied to a security policy rule.
|
Options |
The scheduling, logging, and rule options applicable to the security policy rule. |
Deploy Status |
The deployment status. |