user@host# run show security idp security-package-version
Attack database version:2230(Mon Feb 4 19:40:13 2013 GMT-8)
Detector version :12.6.160121210
Policy template version :2230
6. Download the predefined IDP policy templates.
[edit]
user@host# run request security idp security-package download policy-templates
Will be processed in async mode. Check the status using the status checking
CLI
7. Check the security package download status.
[edit]
user@host# run request security idp security-package download status
Done;Successfully downloaded
from(https://services.netscreen.com/cgi-bin/index.cgi).
Version info:2248
8. Install the IDP policy templates.
[edit]
user@host# run request security idp security-package install policy-templates
Will be processed in async mode. Check the status using the status checking
CLI
9. Verify the installation status update.
[edit]
user@host# run request security idp security-package install status
Done;policy-templates has been successfully updated into internal repository
(=>/var/db/scripts/commit/templates.xsl)!
10. Enable the templates.xsl scripts file. On commit, the Junos OS management process
(mgd) looks in to templates.xsl and installs the required policy.
[edit]
user@host# set system scripts commit file templates.xsl
11. Commit the configuration. The downloaded templates are saved to the Junos OS
configuration database, and they are available in the CLI at the [edit security idp
idp-policy] hierarchy level.
[edit]
user@host# commit
12. Display the list of downloaded templates.
[edit]
user@host# set security idp active-policy ?
Possible completions:
(active-policy) Set active policy
DMZ_Services
DNS_Service
File_Server
Getting_Started
IDP_Default
Recommended
Copyright © 2016, Juniper Networks, Inc.66
Getting Started Guide for Branch SRX Series