Hello dthibodeaux, You can understand it this way: In a security policy, the match will be for ((source zone, address ,user, hip, destination zone, address, service, URL category)). To this, the ACTION is applied ie allow/deny. If Security profiles are attached, then the ACTION will be based on decision taken by security profiles like url, threat etc. For example: source zone- SZn1, SZn2...(or Any) source address- Saddr1, Saddr2...(or Any) soure user- Susr1, Susr2...(or Any) hip profile- Hp1, Hp2...(or Any) Destination zone- Dzn1, Dzn2....(or Any) Destination address- Daddr1, Daddr2....(or Any) Service- Srvc1, Srvc2...(or Any) URL-Category - Ctgry1, Ctgry2...(or Any) Logic will be like this(Rule match is top to down approach): RULE1: ((Szn1 or Szn2 or...) AND (Saddr1 or Saddr2 or...) AND ( Susr1 or Susr2 or....) AND (Hp1 or Hp2 or...) AND (Dzn1 or Dzn2 or...) AND (Daddr1 or Daddr2 or ...) AND (Srvc1 or Srvc2 or....) AND (Ctgry1 or Ctgry2 or...)) RULE2: ((Szn1 or Szn2 or...) AND (Saddr1 or Saddr2 or...) AND ( Susr1 or Susr2 or....) AND (Hp1 or Hp2 or...) AND (Dzn1 or Dzn2 or...) AND (Daddr1 or Daddr2 or ...) AND (Srvc1 or Srvc2 or....) AND (Ctgry1 or Ctgry2 or...)) To this match, the ACTION is applied based on security profiles. Let us know if that helps. Regards, Dileep
... View more