- Created by Jean-luc KRIKER , last modified on Mar 21, 2019
You are viewing an old version of this content. View the current version.
Compare with Current View Version History
« Previous Version 3 Next »
Full script |
full script Expand source
delete set system host-name SRXbuffalo set system name-server 8.8.8.8 set system name-server 8.8.4.4 set system services ssh set system services web-management https interface ge-0/0/0.0 set system services web-management https system-generated-certificate set system syslog archive size 100k set system login announcement "BUFFALO GOLDEN CONFIG V2.6" set system syslog archive files 3 set system syslog user * any emergency set system syslog file messages any critical set system syslog file messages authorization info set system max-configurations-on-flash 5 set system max-configuration-rollbacks 5 set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval set system name-resolution no-resolve-on-input set system ntp server 0.pool.ntp.org set system ntp server 1.pool.ntp.org set services ssl initiation profile ssli protocol-version all set services ssl initiation profile ssli actions ignore-server-auth-failure set services ssl initiation profile ssli trusted-ca all set services ssl initiation profile ssli actions crl disable set security log mode stream set security log format sd-syslog set security log source-interface ge-0/0/0.0 set security log transport protocol tls set security log transport tls-profile ssli set security log transport protocol tls tcp-connections 1 set interfaces ge-0/0/0 unit 0 family inet dhcp set interfaces ge-0/0/0 description " Outbound interface to the Internet " set security zones security-zone LAN-ACCESS host-inbound-traffic protocols all set security zones security-zone LAN-ACCESS interfaces ge-0/0/0.0 set security zones security-zone LAN-ACCESS host-inbound-traffic system-services all delete system autoinstallation set chassis alarm management-ethernet link-down ignore set interfaces ge-0/0/1 promiscuous-mode set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24 set interfaces ge-0/0/1 description " Tap Mode " set interfaces ge-0/0/1 unit 0 family inet address 192.168.255.1/24 arp 192.168.255.254 mac 00:00:01:01:01:01 set routing-instances Sniffer instance-type virtual-router set routing-instances Sniffer routing-options static route 0.0.0.0/0 next-hop 192.168.255.254 set routing-instances Sniffer interface ge-0/0/1.0 set vlans eval vlan-id 10 set interfaces ge-0/0/2 unit 0 family ethernet-switching vlan members eval set interfaces ge-0/0/3 unit 0 family ethernet-switching vlan members eval set interfaces ge-0/0/2 unit 0 family ethernet-switching interface-mode access set interfaces ge-0/0/3 unit 0 family ethernet-switching interface-mode access set services application-identification set security application-tracking set security application-tracking session-update-interval 180 set security flow tcp-session no-syn-check set security flow tcp-session no-sequence-check set security forwarding-process enhanced-services-mode set security zones security-zone Sniffer host-inbound-traffic protocols all set security zones security-zone Sniffer host-inbound-traffic system-services all set security zones security-zone Sniffer interfaces ge-0/0/1.0 set security zones security-zone Sniffer application-tracking set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match source-address any set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match destination-address any set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match application any set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services idp set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services utm-policy UTM-POC set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then log session-close set security zones security-zone Inline host-inbound-traffic protocols all set security zones security-zone Inline host-inbound-traffic system-services all set security zones security-zone Inline interfaces ge-0/0/2.0 set security zones security-zone Inline interfaces ge-0/0/3.0 set security zones security-zone Inline application-tracking set security policies from-zone Inline to-zone Inline policy Inline1 match source-address any set security policies from-zone Inline to-zone Inline policy Inline1 match destination-address any set security policies from-zone Inline to-zone Inline policy Inline1 match application any set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services idp set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services utm-policy UTM-POC set security policies from-zone Inline to-zone Inline policy Inline1 then log session-close set security utm feature-profile web-filtering type juniper-enhanced set security utm utm-policy UTM-POC web-filtering http-profile EVAL-EWF set security utm utm-policy UTM-POC traffic-options sessions-per-client over-limit log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Bot_Networks action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Weapons action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Web_Sites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Material action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Command_and_Control action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Payloads action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Violence action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Drugs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Alcohol_and_Tobacco action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Gambling action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Keyloggers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_Link action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_iFrame action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Spyware action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Mobile_Malware action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Abused_Drugs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Application_and_Software_Download action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Compromised_Websites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Custom_Encrypted_Payloads action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_DNS action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Elevated_Exposure action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Emerging_Exploits action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Entertainment_Video action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Extended_Protection action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_File_Download_Servers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Files_Containing_Passwords action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Freeware_and_Software_Download action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Games action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Hacking action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Illegal_or_Questionable action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Image_Servers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Instant_Messaging action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Internet_Radio_and_TV action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Intolerance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Lingerie_and_Swimsuit action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_MP3_and_Audio_Download_Services action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Marijuana action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Militancy_and_Extremist action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Military action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Network_Errors action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Newly_Registered_Websites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_News_and_Media action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions_and_Occult_and_Folklore action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Nudity action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Online_Brokerage_and_Trading action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Organizational_Email action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Pay_to_Surf action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Peer_to_Peer_File_Sharing action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personal_Network_Storage_and_Backup action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personals_and_Dating action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Phishing_and_Other_Frauds action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Political_Organizations action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Damaging_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Exploited_Documents action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Unwanted_Software action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Private_IP_Addresses action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Proxy_Avoidance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Racism_and_Hate action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Security action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex_Education action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_Networking_and_Personal_Sites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_and_Affiliation_Organizations action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sport_Hunting_and_Gun_Clubs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Streaming_Media action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Supplements_and_Unregulated_Compounds action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Surveillance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Embedded_Link action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Tasteless action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Text_and_Media_Messaging action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Unauthorized_Mobile_Marketplaces action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Chat action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Collaboration action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Hosting action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_and_Email_Spam action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF default log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings default log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings server-connectivity log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings timeout log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings too-many-requests log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF timeout 3 set security idp idp-policy Recommended rulebase-ips rule 1 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 1 match source-address any set security idp idp-policy Recommended rulebase-ips rule 1 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 1 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 1 match application default set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Critical" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Minor" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Major" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Critical" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Minor" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Major" set security idp idp-policy Recommended rulebase-ips rule 1 then action no-action set security idp idp-policy Recommended rulebase-ips rule 1 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 2 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 2 match source-address any set security idp idp-policy Recommended rulebase-ips rule 2 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 2 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 2 match application default set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Major" set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Minor" set security idp idp-policy Recommended rulebase-ips rule 2 then action no-action set security idp idp-policy Recommended rulebase-ips rule 2 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 3 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 3 match source-address any set security idp idp-policy Recommended rulebase-ips rule 3 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 3 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 3 match application default set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Major" set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 3 then action no-action set security idp idp-policy Recommended rulebase-ips rule 3 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 4 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 4 match source-address any set security idp idp-policy Recommended rulebase-ips rule 4 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 4 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 4 match application default set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Major" set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 4 then action no-action set security idp idp-policy Recommended rulebase-ips rule 4 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 5 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 5 match source-address any set security idp idp-policy Recommended rulebase-ips rule 5 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 5 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 5 match application default set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Critical" set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Minor" set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Major" set security idp idp-policy Recommended rulebase-ips rule 5 then action no-action set security idp idp-policy Recommended rulebase-ips rule 5 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 6 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 6 match source-address any set security idp idp-policy Recommended rulebase-ips rule 6 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 6 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 6 match application default set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Major" set security idp idp-policy Recommended rulebase-ips rule 6 then action no-action set security idp idp-policy Recommended rulebase-ips rule 6 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 7 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 7 match source-address any set security idp idp-policy Recommended rulebase-ips rule 7 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 7 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 7 match application default set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Critical" set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Minor" set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Major" set security idp idp-policy Recommended rulebase-ips rule 7 then action no-action set security idp idp-policy Recommended rulebase-ips rule 7 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 8 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 8 match source-address any set security idp idp-policy Recommended rulebase-ips rule 8 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 8 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 8 match application default set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Critical" set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Major" set security idp idp-policy Recommended rulebase-ips rule 8 then action no-action set security idp idp-policy Recommended rulebase-ips rule 8 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 9 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 9 match source-address any set security idp idp-policy Recommended rulebase-ips rule 9 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 9 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 9 match application default set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 then action no-action set security idp idp-policy Recommended rulebase-ips rule 9 then notification log-attacks set security idp active-policy Recommended set security idp sensor-configuration flow idp-bypass-cpu-usg-overload set services advanced-anti-malware policy skypolicy1 match application HTTP set services advanced-anti-malware policy skypolicy1 match verdict-threshold 6 set services advanced-anti-malware policy skypolicy1 then action block set services advanced-anti-malware policy skypolicy1 then notification log set services advanced-anti-malware policy skypolicy1 inspection-profile atp_all_profile set services advanced-anti-malware policy skypolicy1 fallback-options action permit set services advanced-anti-malware policy skypolicy1 fallback-options notification log set services advanced-anti-malware policy skypolicy1 whitelist-notification log set services advanced-anti-malware policy skypolicy1 blacklist-notification log set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services advanced-anti-malware-policy skypolicy1 set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services advanced-anti-malware-policy skypolicy1 set services security-intelligence profile feeds-cc-p1 category CC set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 6 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 7 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 8 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 9 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 10 set services security-intelligence profile feeds-cc-p1 rule 1 then action recommended set services security-intelligence profile feeds-cc-p1 rule 1 then log set services security-intelligence profile feeds-cc-p1 default-rule then action permit set services security-intelligence profile feeds-cc-p1 default-rule then log set services security-intelligence profile Inf-Hosts category Infected-Hosts set services security-intelligence profile Inf-Hosts rule 1 match threat-level 9 set services security-intelligence profile Inf-Hosts rule 1 match threat-level 10 set services security-intelligence profile Inf-Hosts rule 1 then action permit set services security-intelligence profile Inf-Hosts rule 1 then log set services security-intelligence profile Inf-Hosts default-rule then action permit set services security-intelligence profile Inf-Hosts default-rule then log set services security-intelligence policy pol-cc CC feeds-cc-p1 set services security-intelligence policy pol-cc Infected-Hosts Inf-Hosts set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services security-intelligence-policy pol-cc set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services security-intelligence-policy pol-cc set security utm feature-profile anti-virus type sophos-engine set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options default log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options content-size log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options out-of-resources log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options timeout log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options too-many-requests log-and-permit set security utm utm-policy UTM-POC anti-virus http-profile EVAL-AV set security log stream skyenterprise host 138.68.58.31 set security log stream skyenterprise host port 5390 set security log stream skyenterprise format sd-syslog set system services ssh protocol-version v2 set system login user skyenterprise class super-user authentication encrypted-password $1$skyenter$WMnIWq2WYm.98cHNXXM/D. set system services outbound-ssh client skyenterprise-ncd01 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7 set system services outbound-ssh client skyenterprise-ncd01 services netconf keep-alive retry 3 timeout 5 set system services outbound-ssh client skyenterprise-ncd01 skyent-ncd01.juniper.net port 4087 timeout 60 retry 1000 set system services outbound-ssh client skyenterprise-ncd02 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7 set system services outbound-ssh client skyenterprise-ncd02 services netconf keep-alive retry 3 timeout 5 set system services outbound-ssh client skyenterprise-ncd02 skyent-ncd02.juniper.net port 4087 timeout 60 retry 1000 set security log mode stream transport protocol tls tls-profile skyenterprise tcp-connections 1 set security log stream skyenterprise severity debug category all set security log stream skyenterprise rate-limit 300 set services ssl initiation profile skyenterprise protocol-version all actions ignore-server-auth-failure crl disable set security log stream skyenterprise format sd-syslog host 138.68.58.31 port 5390 ### Customize your source-interface for on device setup (uncomment next line) set security log source-interface ge-0/0/0.0 |
UTM: web-filtering anti-virus |
UTM config Expand source
set security utm feature-profile web-filtering type juniper-enhanced set security utm utm-policy UTM-POC web-filtering http-profile EVAL-EWF set security utm utm-policy UTM-POC traffic-options sessions-per-client over-limit log-and-permit # web-filtering profile EVAL-EWF set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Bot_Networks action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Weapons action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Web_Sites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Material action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Command_and_Control action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Payloads action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Violence action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Drugs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Alcohol_and_Tobacco action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Gambling action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Keyloggers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_Link action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_iFrame action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Spyware action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Mobile_Malware action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Abused_Drugs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Application_and_Software_Download action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Compromised_Websites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Custom_Encrypted_Payloads action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_DNS action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Elevated_Exposure action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Emerging_Exploits action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Entertainment_Video action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Extended_Protection action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_File_Download_Servers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Files_Containing_Passwords action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Freeware_and_Software_Download action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Games action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Hacking action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Illegal_or_Questionable action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Image_Servers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Instant_Messaging action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Internet_Radio_and_TV action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Intolerance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Lingerie_and_Swimsuit action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_MP3_and_Audio_Download_Services action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Marijuana action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Militancy_and_Extremist action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Military action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Network_Errors action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Newly_Registered_Websites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_News_and_Media action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions_and_Occult_and_Folklore action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Nudity action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Online_Brokerage_and_Trading action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Organizational_Email action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Pay_to_Surf action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Peer_to_Peer_File_Sharing action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personal_Network_Storage_and_Backup action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personals_and_Dating action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Phishing_and_Other_Frauds action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Political_Organizations action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Damaging_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Exploited_Documents action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Unwanted_Software action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Private_IP_Addresses action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Proxy_Avoidance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Racism_and_Hate action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Security action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex_Education action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_Networking_and_Personal_Sites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_and_Affiliation_Organizations action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sport_Hunting_and_Gun_Clubs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Streaming_Media action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Supplements_and_Unregulated_Compounds action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Surveillance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Embedded_Link action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Tasteless action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Text_and_Media_Messaging action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Unauthorized_Mobile_Marketplaces action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Chat action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Collaboration action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Hosting action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_and_Email_Spam action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF default log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings default log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings server-connectivity log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings timeout log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings too-many-requests log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF timeout 3 # Anti virus: sophos engine set security utm feature-profile anti-virus type sophos-engine set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options default log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options content-size log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options out-of-resources log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options timeout log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options too-many-requests log-and-permit set security utm utm-policy UTM-POC anti-virus http-profile EVAL-AV # |
IDP |
idp config Expand source
set security idp idp-policy Recommended rulebase-ips rule 1 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 1 match source-address any set security idp idp-policy Recommended rulebase-ips rule 1 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 1 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 1 match application default set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Critical" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Minor" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Major" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Critical" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Minor" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Major" set security idp idp-policy Recommended rulebase-ips rule 1 then action no-action set security idp idp-policy Recommended rulebase-ips rule 1 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 2 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 2 match source-address any set security idp idp-policy Recommended rulebase-ips rule 2 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 2 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 2 match application default set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Major" set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Minor" set security idp idp-policy Recommended rulebase-ips rule 2 then action no-action set security idp idp-policy Recommended rulebase-ips rule 2 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 3 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 3 match source-address any set security idp idp-policy Recommended rulebase-ips rule 3 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 3 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 3 match application default set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Major" set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 3 then action no-action set security idp idp-policy Recommended rulebase-ips rule 3 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 4 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 4 match source-address any set security idp idp-policy Recommended rulebase-ips rule 4 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 4 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 4 match application default set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Major" set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 4 then action no-action set security idp idp-policy Recommended rulebase-ips rule 4 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 5 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 5 match source-address any set security idp idp-policy Recommended rulebase-ips rule 5 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 5 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 5 match application default set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Critical" set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Minor" set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Major" set security idp idp-policy Recommended rulebase-ips rule 5 then action no-action set security idp idp-policy Recommended rulebase-ips rule 5 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 6 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 6 match source-address any set security idp idp-policy Recommended rulebase-ips rule 6 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 6 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 6 match application default set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Major" set security idp idp-policy Recommended rulebase-ips rule 6 then action no-action set security idp idp-policy Recommended rulebase-ips rule 6 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 7 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 7 match source-address any set security idp idp-policy Recommended rulebase-ips rule 7 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 7 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 7 match application default set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Critical" set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Minor" set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Major" set security idp idp-policy Recommended rulebase-ips rule 7 then action no-action set security idp idp-policy Recommended rulebase-ips rule 7 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 8 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 8 match source-address any set security idp idp-policy Recommended rulebase-ips rule 8 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 8 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 8 match application default set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Critical" set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Major" set security idp idp-policy Recommended rulebase-ips rule 8 then action no-action set security idp idp-policy Recommended rulebase-ips rule 8 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 9 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 9 match source-address any set security idp idp-policy Recommended rulebase-ips rule 9 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 9 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 9 match application default set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 then action no-action set security idp idp-policy Recommended rulebase-ips rule 9 then notification log-attacks set security idp active-policy Recommended set security idp sensor-configuration flow idp-bypass-cpu-usg-overload |
Security-intelligence |
secintel Expand source
set services security-intelligence profile feeds-cc-p1 category CC set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 6 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 7 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 8 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 9 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 10 set services security-intelligence profile feeds-cc-p1 rule 1 then action recommended set services security-intelligence profile feeds-cc-p1 rule 1 then log set services security-intelligence profile feeds-cc-p1 default-rule then action permit set services security-intelligence profile feeds-cc-p1 default-rule then log set services security-intelligence profile Inf-Hosts category Infected-Hosts set services security-intelligence profile Inf-Hosts rule 1 match threat-level 9 set services security-intelligence profile Inf-Hosts rule 1 match threat-level 10 set services security-intelligence profile Inf-Hosts rule 1 then action permit set services security-intelligence profile Inf-Hosts rule 1 then log set services security-intelligence profile Inf-Hosts default-rule then action permit set services security-intelligence profile Inf-Hosts default-rule then log set services security-intelligence policy pol-cc CC feeds-cc-p1 set services security-intelligence policy pol-cc Infected-Hosts Inf-Hosts |
Sky ATP / anti-malware |
Sky-ATP - Anti malware Expand source
set services advanced-anti-malware policy skypolicy1 match application HTTP set services advanced-anti-malware policy skypolicy1 match verdict-threshold 6 set services advanced-anti-malware policy skypolicy1 then action block set services advanced-anti-malware policy skypolicy1 then notification log set services advanced-anti-malware policy skypolicy1 inspection-profile atp_all_profile set services advanced-anti-malware policy skypolicy1 fallback-options action permit set services advanced-anti-malware policy skypolicy1 fallback-options notification log set services advanced-anti-malware policy skypolicy1 whitelist-notification log set services advanced-anti-malware policy skypolicy1 blacklist-notification log |
syslog & security log | |
management and ... | |
- No labels