Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Select a Security Policy Rule Source

You can select the source endpoint from the list of zones, addresses, including the identity of such source end point.

  1. Click Sources.
    The Sources page is displayed.
  2. Complete the configuration according to the guidelines provided in Fields on the Source Page
    Table 1: Fields on the Source Page
    Field Description

    Zone

    Select a source zone for SRX Series Firewalls to define the context for the policy.

    Zone policies are applied on traffic entering from a source zone to a destination zone.

    Addresses

    Enter the address names or address set names to include in the security policy rule.

    • Any—Add any address to the security policy rule.
    • Specific—Select the addresses to include in the security policy rule.

    Exclude addresses

    Select the addresses to exclude from the security policy rule.

    This setting is available only when you select Specific in Addresses.

    Identitity

    Select the source identity to use as the match criteria for the policy.

    You can have different policy rules based on user roles and user groups.

  3. Click OK.