EasyManuals Logo
Home>Juniper>Network Hardware>Junos OS

Juniper Junos OS User Manual

Juniper Junos OS
158 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #137 background imageLoading...
Page #137 background image
Output Fields Table 16 on page 121 lists the output fields for the show security policies command. Output
fields are listed in the approximate order in which they appear.
Table 16: show security policies Output Fields
Field DescriptionField Name
Name of the source zone.From zone
Name of the destination zone.To zone
Name of the applicable policy.Policy
Description of the applicable policy.Description
Status of the policy:
enabled: The policy can be used in the policy lookup process, which determines access
rights for a packet and the action taken in regard to it.
disabled: The policy cannot be used in the policy lookup process, and therefore it is
not available for access control.
State
Internal number associated with the policy.Index
Number of the policy within a given context. For example, three policies that are applicable
in a from-zoneA-to-zoneB context might be ordered with sequence numbers 1, 2, 3. Also,
in a from-zoneC-to-zoneD context, four policies might have sequence numbers 1, 2, 3,
4.
Sequence number
For standard display mode, the names of the source addresses for a policy. Address sets
are resolved to their individual names.
For detail display mode, the names and corresponding IP addresses of the source
addresses for a policy. Address sets are resolved to their individual address name-IP
address pairs.
Source addresses
Name of the destination address (or address set) as it was entered in the destination
zone’s address book. A packet’s destination address must match this value for the policy
to apply to it.
Destination addresses
Name of the source address excluded from the policy.Source addresses (excluded)
Name of the destination address excluded from the policy.Destination addresses (excluded)
One or more user roles specified for a policy.Source identities
121Copyright © 2016, Juniper Networks, Inc.
Chapter 12: Operational Commands

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Juniper Junos OS and is the answer not in the manual?

Juniper Junos OS Specifications

General IconGeneral
BrandJuniper
ModelJunos OS
CategoryNetwork Hardware
LanguageEnglish

Related product manuals