WebUI Policy Icons

This table lists the different icons used in the Policies page that represent various components of a policy.

Note: In the WebUI, moving your mouse cursor over any icon in the Action and Options columns of the policy list provides specific details.

 

ICON
FUNCTION
DESCRIPTION

Permit

The security device passes all traffic to which the policy applies.

Deny

The security device blocks all traffic to which the policy applies.

Reject

The security device blocks all traffic to which the policy applies. It drops the packet and sends a TCP reset (RST) segment to the source host for TCP traffic and an ICMP “destination unreachable, port unreachable” message (type 3, code 3) for UDP traffic. For types of traffic other than TCP and UDP, the security device drops the packet without notifying the source host, which is also what occurs when the action is “deny”.

Policy-level NAT

The security device performs policy-based source or destination network address translation (NAT-src or NAT-dst) on all traffic to which the policy applies.

Encapsulation and Decapsulation

The security device encapsulates all outbound VPN traffic and decapsulates all inbound VPN traffic to which the policy applies .

Bidirectional VPN Policies

A matching VPN policy exists for the opposite direction.

Authentication

The user must authenticate himself/herself when initiating a connection.

Logging

The security device logs all traffic to which the policy applies and makes it available for syslog, and e-mail, if enabled.

Clicking the icon takes you to the traffic log located in the Reports section.

Counting

The security device counts the amount of traffic to which the policy applies.

Clicking the icon takes you to the traffic counting graph located in the Reports section.

Antivirus
(Trend Micro)

(For security devices that support antivirus) The security device sends all traffic to which the policy applies to the Trend Micro antivirus (AV) scanner.

Antivirus (Juniper-Kaspersky)

 

(For security devices that support antivirus) The security device sends all traffic to which the policy applies to the Juniper-Kaspersky antivirus (AV) scanner.

Deep Inspection

The security device performs Deep Inspection (DI) on all traffic to which the policy applies.

Deep Inspection and Trend Micro Antivirus

(For security devices that support antivirus) The security device performs Deep Inspection and antivirus protection on all traffic to which the policy applies.

Deep Inspection and Juniper-Kaspersky Antivirus

(For security devices that support antivirus) The security device performs Deep Inspection and antivirus protection on all traffic to which the policy applies.

URL Filtering

The security device sends all traffic to which the policy applies to an external URL filtering server.

Alarm

When the amount of traffic surpasses a threshold that you have set, the security device makes an entry in the traffic log for this policy. Clicking the icon takes you to the traffic log located in the Reports section.