2. Attach a predefined antivirus profile for the HTTP protocol to the UTM policy.
[edit]
user@srx210-host# set security utm utm-policy policy-utm-all anti-virus http-profile
junos-av-defaults
NOTE: A separate antivirus profile is required for each protocol. The
available protocols include HTTP, SMTP, POP3, and IMAP.
3. Attach a predefined Web filtering profile for HTTP to the UTM policy.
[edit]
user@srx210-host# set security utm utm-policy policy-utm-all web-filtering
http-profile junos-wf-cpa-default
4. Attach the UTM policy to the default security policy (policy from the trust zone to
the untrust zone), and set the application services to be allowed.
[edit]
user@srx210-host# set security policies from-zone trust to-zone untrust policy
trust-to-untrust match source-address any destination-address any application
any
user@srx210-host# set security policies from-zone trust to-zone untrust policy
trust-to-untrust then permit application-services utm-policy policy-utm-all
Results From configuration mode, confirm your configuration by entering the show security utm
and show security policies commands. If the output does not display the intended
configuration, repeat the configuration instructions in this example to correct it.
[edit]
user@srx210-host# show security utm
utm-policy policy-utm-all {
anti-virus {
http-profile junos-av-defaults;
}
web-filtering {
http-profile junos-wf-cpa-default;
}
anti-spam {
smtp-profile junos-as-defaults;
}
}
[edit]
user@srx210-host# show security policies from-zone trust to-zone untrust policy
trust-to-untrust
policy trust-to-untrust {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
Copyright © 2016, Juniper Networks, Inc.52
Getting Started Guide for Branch SRX Series