Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »


https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-policy-configuration.html#id-understanding-security-policies-for-self-traffic

Self-traffic or host traffic, is the host-inbound traffic; that is, the traffic terminating on the device or the host-outbound traffic that is the traffic originating from the device.


FYI:

Security policies are configured on the devices to apply services to the traffic flowing through the device.
For example UAC and UTM policies are configured to apply services to the transient traffic.

  • No labels