EasyManua.ls Logo

Juniper Junos OS - [Edit Security Zones] Hierarchy Level

Juniper Junos OS
158 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
}
http-profile profile-name;
imap-profile profile-name;
pop3-profile profile-name;
smtp-profile profile-name;
}
traffic-options {
sessions-per-client {
limit value;
over-limit (block | log-and-permit);
}
}
web-filtering {
http-profile profile-name;
}
}
}
}
Related
Documentation
Security Configuration Statement Hierarchy on page 75
Unified Threat Management Overview
[edit security zones] Hierarchy Level
security {
zones {
functional-zone {
management {
description text;
host-inbound-traffic {
protocols protocol-name {
except;
}
system-services service-name {
except;
}
}
interfaces interface-name {
host-inbound-traffic {
protocols protocol-name {
except;
}
system-services service-name {
except;
}
}
}
screen screen-name;
}
}
security-zone zone-name {
address-book {
address address-name {
ip-prefix {
105Copyright © 2016, Juniper Networks, Inc.
Chapter 11: Configuration Statements

Table of Contents

Related product manuals