End-of-Life (EoL)
Overriding or Reverting a Security Policy Rule
The default security rules—interzone-default and intrazone-default—have predefined
settings that you can override on a firewall or on Panorama. If
a firewall receives the default rules from a device group, you can
also override the device group settings. The firewall or virtual
system where you perform the override stores a local version of
the rule in its configuration. The settings you can override are
a subset of the full set (the following table lists the subset for security
rules). For details on the default security rules, see Policies
> Security.
To override a rule, select on a firewall or on Panorama.
The Name column displays the inheritance icon (
) for rules you
can override. Select the rule, click
Policies
Security
Policies
Security
Default Rules

Override
,
and edit the settings in the following table.To revert an overridden rule to its predefined settings or to
the settings pushed from a Panorama device group, select on
a firewall or on Panorama.
The Name column displays the override icon (
) for rules that
have overridden values. Select the rule, click
Policies
Security
Policies
Security
Default Rules

Revert
,
and click Yes
to confirm the operation.Fields to Override
a Default Security Rule | Description |
---|---|
General Tab | |
Name | The Name that identifies
the rule is read-only; you cannot override it. |
Rule Type | The Rule Type is
read-only; you cannot override it. |
Description | The Description is
read-only; you cannot override it. |
Tag | Select Tags from
the drop-down.A policy tag is a keyword or phrase that enables
you to sort or filter policies. This is useful when you have defined
many policies and want to view those that are tagged with a particular
keyword. For example, you might want to tag certain security policies
with Inbound to DMZ, tag specific decryption policies with the words
Decrypt or No-decrypt, or use the name of a specific data center
for policies associated with that location. |
Actions Tab | |
Action Setting | Select the appropriate Action for
traffic that matches the rule.
|
Profile Setting | Profile Type —Assign
profiles or profile groups to the security rule:
|
Log Setting | Specify any combination of the following
options:
|
Recommended For You
Recommended Videos
Recommended videos not found.