}
firewall-authentication {
pass-through {
access-profile profile-name;
client-match user-or-group-name;
ssl-termination-profile profile-name;
web-redirect;
web-redirect-to-https;
}
user-firewall {
access-profile profile-name;
domain domain-name
ssl-termination-profile profile-name;
}
web-authentication {
client-match user-or-group-name;
}
}
services-offload;
tcp-options {
initial-tcp-mss mss-value;
reverse-tcp-mss mss-value;
sequence-check-required;
syn-check-required;
}
}
reject;
}
}
}
policy-rematch;
policy-stats {
system-wide (disable | enable);
}
traceoptions {
file {
filename;
files number;
match regular-expression;
(no-world-readable | world-readable);
size maximum-file-size;
}
flag flag;
no-remote-trace;
}
}
}
Related
Documentation
Security Configuration Statement Hierarchy on page 75•
• Understanding Security Building Blocks for Security Devices
• Unified Threat Management Overview
97Copyright © 2016, Juniper Networks, Inc.
Chapter 11: Configuration Statements