/
script for the creation of ANR report

script for the creation of ANR report




Full script
full script
delete
set system host-name SRXbuffalo
set system name-server 8.8.8.8
set system name-server 8.8.4.4
set system services ssh
set system services web-management https interface ge-0/0/0.0
set system services web-management https system-generated-certificate
set system syslog archive size 100k
set system login announcement "BUFFALO GOLDEN CONFIG V2.6"
set system syslog archive files 3
set system syslog user * any emergency
set system syslog file messages any critical
set system syslog file messages authorization info
set system max-configurations-on-flash 5
set system max-configuration-rollbacks 5
set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
set system name-resolution no-resolve-on-input
set system ntp server 0.pool.ntp.org
set system ntp server 1.pool.ntp.org
set services ssl initiation profile ssli protocol-version all
set services ssl initiation profile ssli actions ignore-server-auth-failure 
set services ssl initiation profile ssli trusted-ca all
set services ssl initiation profile ssli actions crl disable
set security log mode stream
set security log format sd-syslog
set security log source-interface ge-0/0/0.0 
set security log transport protocol tls
set security log transport tls-profile ssli
set security log transport protocol tls tcp-connections 1
set interfaces ge-0/0/0 unit 0 family inet dhcp
set interfaces ge-0/0/0 description " Outbound interface to the Internet "
set security zones security-zone LAN-ACCESS host-inbound-traffic protocols all 
set security zones security-zone LAN-ACCESS interfaces ge-0/0/0.0
set security zones security-zone LAN-ACCESS host-inbound-traffic system-services all
delete system autoinstallation
set chassis alarm management-ethernet link-down ignore  
set interfaces ge-0/0/1 promiscuous-mode
set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24
set interfaces ge-0/0/1 description " Tap Mode "
set interfaces ge-0/0/1 unit 0 family inet address 192.168.255.1/24 arp 192.168.255.254 mac 00:00:01:01:01:01
set routing-instances Sniffer instance-type virtual-router
set routing-instances Sniffer routing-options static route 0.0.0.0/0 next-hop 192.168.255.254
set routing-instances Sniffer interface ge-0/0/1.0
set vlans eval vlan-id 10
set interfaces ge-0/0/2 unit 0 family ethernet-switching vlan members eval
set interfaces ge-0/0/3 unit 0 family ethernet-switching vlan members eval
set interfaces ge-0/0/2 unit 0 family ethernet-switching interface-mode access 
set interfaces ge-0/0/3 unit 0 family ethernet-switching interface-mode access
set services application-identification
set security application-tracking
set security application-tracking session-update-interval 180
set security flow tcp-session no-syn-check
set security flow tcp-session no-sequence-check
set security forwarding-process enhanced-services-mode
set security zones security-zone Sniffer host-inbound-traffic protocols all 
set security zones security-zone Sniffer host-inbound-traffic system-services all 
set security zones security-zone Sniffer interfaces ge-0/0/1.0
set security zones security-zone Sniffer application-tracking
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match source-address any
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match destination-address any
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match application any
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services idp
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services utm-policy UTM-POC
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then log session-close
set security zones security-zone Inline host-inbound-traffic protocols all 
set security zones security-zone Inline host-inbound-traffic system-services all 
set security zones security-zone Inline interfaces ge-0/0/2.0
set security zones security-zone Inline interfaces ge-0/0/3.0
set security zones security-zone Inline application-tracking
set security policies from-zone Inline to-zone Inline policy Inline1 match source-address any
set security policies from-zone Inline to-zone Inline policy Inline1 match destination-address any
set security policies from-zone Inline to-zone Inline policy Inline1 match application any
set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services idp
set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services utm-policy UTM-POC
set security policies from-zone Inline to-zone Inline policy Inline1 then log session-close
set security utm feature-profile web-filtering type juniper-enhanced
set security utm utm-policy UTM-POC web-filtering http-profile EVAL-EWF
set security utm utm-policy UTM-POC traffic-options sessions-per-client over-limit log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Bot_Networks action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Weapons action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Content action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Web_Sites action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Material action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Command_and_Control action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Payloads action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Violence action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Drugs action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Alcohol_and_Tobacco action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Gambling action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Keyloggers action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_Link action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_iFrame action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Spyware action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Mobile_Malware action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Abused_Drugs action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Application_and_Software_Download action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Compromised_Websites action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Custom_Encrypted_Payloads action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_Content action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_DNS action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Elevated_Exposure action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Emerging_Exploits action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Entertainment_Video action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Extended_Protection action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_File_Download_Servers action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Files_Containing_Passwords action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Freeware_and_Software_Download action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Games action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Hacking action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Illegal_or_Questionable action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Image_Servers action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Instant_Messaging action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Internet_Radio_and_TV action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Intolerance action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Lingerie_and_Swimsuit action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_MP3_and_Audio_Download_Services action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Marijuana action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Militancy_and_Extremist action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Military action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Network_Errors action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Newly_Registered_Websites action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_News_and_Media action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions_and_Occult_and_Folklore action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Nudity action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Online_Brokerage_and_Trading action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Organizational_Email action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Pay_to_Surf action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Peer_to_Peer_File_Sharing action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personal_Network_Storage_and_Backup action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personals_and_Dating action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Phishing_and_Other_Frauds action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Political_Organizations action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Damaging_Content action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Exploited_Documents action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Unwanted_Software action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Private_IP_Addresses action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Proxy_Avoidance action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Racism_and_Hate action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Security action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex_Education action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_Networking_and_Personal_Sites action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_and_Affiliation_Organizations action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sport_Hunting_and_Gun_Clubs action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Streaming_Media action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Supplements_and_Unregulated_Compounds action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Surveillance action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Content action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Embedded_Link action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Tasteless action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Text_and_Media_Messaging action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Unauthorized_Mobile_Marketplaces action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Chat action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Collaboration action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Hosting action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_and_Email_Spam action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF default log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings default log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings server-connectivity log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings timeout log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings too-many-requests log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF timeout 3
set security idp idp-policy Recommended rulebase-ips rule 1 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 1 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 1 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 1 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 1 match application default
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Major"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Major"
set security idp idp-policy Recommended rulebase-ips rule 1 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 1 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 2 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 2 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 2 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 2 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 2 match application default
set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Major"
set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 2 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 2 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 3 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 3 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 3 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 3 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 3 match application default
set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Major"
set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 3 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 3 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 4 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 4 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 4 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 4 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 4 match application default
set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Major"
set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 4 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 4 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 5 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 5 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 5 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 5 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 5 match application default
set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Critical"
set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Minor"
set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Major"
set security idp idp-policy Recommended rulebase-ips rule 5 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 5 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 6 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 6 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 6 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 6 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 6 match application default
set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Major"
set security idp idp-policy Recommended rulebase-ips rule 6 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 6 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 7 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 7 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 7 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 7 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 7 match application default
set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Critical"
set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Minor"
set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Major"
set security idp idp-policy Recommended rulebase-ips rule 7 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 7 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 8 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 8 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 8 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 8 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 8 match application default
set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Major"
set security idp idp-policy Recommended rulebase-ips rule 8 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 8 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 9 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 9 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 9 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 9 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 9 match application default
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Critical"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Major"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Minor"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Critical"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Major"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Minor"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Critical"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Major"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Minor"
set security idp idp-policy Recommended rulebase-ips rule 9 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 9 then notification log-attacks
set security idp active-policy Recommended
set security idp sensor-configuration flow idp-bypass-cpu-usg-overload
set services advanced-anti-malware policy skypolicy1 match application HTTP
set services advanced-anti-malware policy skypolicy1 match verdict-threshold 6
set services advanced-anti-malware policy skypolicy1 then action block
set services advanced-anti-malware policy skypolicy1 then notification log
set services advanced-anti-malware policy skypolicy1 inspection-profile atp_all_profile
set services advanced-anti-malware policy skypolicy1 fallback-options action permit
set services advanced-anti-malware policy skypolicy1 fallback-options notification log
set services advanced-anti-malware policy skypolicy1 whitelist-notification log
set services advanced-anti-malware policy skypolicy1 blacklist-notification log
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services advanced-anti-malware-policy skypolicy1
set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services advanced-anti-malware-policy skypolicy1
set services security-intelligence profile feeds-cc-p1 category CC
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 6
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 7
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 8
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 9
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 10
set services security-intelligence profile feeds-cc-p1 rule 1 then action recommended
set services security-intelligence profile feeds-cc-p1 rule 1 then log
set services security-intelligence profile feeds-cc-p1 default-rule then action permit
set services security-intelligence profile feeds-cc-p1 default-rule then log
set services security-intelligence profile Inf-Hosts category Infected-Hosts
set services security-intelligence profile Inf-Hosts rule 1 match threat-level 9
set services security-intelligence profile Inf-Hosts rule 1 match threat-level 10
set services security-intelligence profile Inf-Hosts rule 1 then action permit
set services security-intelligence profile Inf-Hosts rule 1 then log
set services security-intelligence profile Inf-Hosts default-rule then action permit
set services security-intelligence profile Inf-Hosts default-rule then log
set services security-intelligence policy pol-cc CC feeds-cc-p1
set services security-intelligence policy pol-cc Infected-Hosts Inf-Hosts
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services security-intelligence-policy pol-cc
set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services security-intelligence-policy pol-cc
set security utm feature-profile anti-virus type sophos-engine
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options default log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options content-size log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options out-of-resources log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options timeout log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options too-many-requests log-and-permit
set security utm utm-policy UTM-POC anti-virus http-profile EVAL-AV
set security log stream skyenterprise host 138.68.58.31
set security log stream skyenterprise host port 5390
set security log stream skyenterprise format sd-syslog
set system services ssh protocol-version v2
set system login user skyenterprise class super-user authentication encrypted-password $1$skyenter$WMnIWq2WYm.98cHNXXM/D.
set system services outbound-ssh client skyenterprise-ncd01 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7
set system services outbound-ssh client skyenterprise-ncd01 services netconf keep-alive retry 3 timeout 5
set system services outbound-ssh client skyenterprise-ncd01 skyent-ncd01.juniper.net port 4087 timeout 60 retry 1000
set system services outbound-ssh client skyenterprise-ncd02 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7
set system services outbound-ssh client skyenterprise-ncd02 services netconf keep-alive retry 3 timeout 5
set system services outbound-ssh client skyenterprise-ncd02 skyent-ncd02.juniper.net port 4087 timeout 60 retry 1000
set security log mode stream transport protocol tls tls-profile skyenterprise tcp-connections 1
set security log stream skyenterprise severity debug category all
set security log stream skyenterprise rate-limit 300
set services ssl initiation profile skyenterprise protocol-version all actions ignore-server-auth-failure crl disable
set security log stream skyenterprise format sd-syslog host 138.68.58.31 port 5390
### Customize your source-interface for on device setup (uncomment next line)
set security log source-interface ge-0/0/0.0

UTM: 

web-filtering

anti-virus


UTM config
set security utm feature-profile web-filtering type juniper-enhanced

set security utm utm-policy UTM-POC web-filtering http-profile EVAL-EWF
set security utm utm-policy UTM-POC traffic-options sessions-per-client over-limit log-and-permit

# web-filtering profile EVAL-EWF
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Bot_Networks action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Weapons action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Content action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Web_Sites action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Material action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Command_and_Control action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Payloads action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Violence action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Drugs action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Alcohol_and_Tobacco action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Gambling action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Keyloggers action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_Link action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_iFrame action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Spyware action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Mobile_Malware action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Abused_Drugs action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Application_and_Software_Download action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Compromised_Websites action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Custom_Encrypted_Payloads action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_Content action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_DNS action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Elevated_Exposure action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Emerging_Exploits action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Entertainment_Video action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Extended_Protection action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_File_Download_Servers action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Files_Containing_Passwords action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Freeware_and_Software_Download action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Games action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Hacking action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Illegal_or_Questionable action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Image_Servers action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Instant_Messaging action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Internet_Radio_and_TV action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Intolerance action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Lingerie_and_Swimsuit action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_MP3_and_Audio_Download_Services action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Marijuana action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Militancy_and_Extremist action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Military action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Network_Errors action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Newly_Registered_Websites action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_News_and_Media action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions_and_Occult_and_Folklore action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Nudity action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Online_Brokerage_and_Trading action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Organizational_Email action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Pay_to_Surf action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Peer_to_Peer_File_Sharing action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personal_Network_Storage_and_Backup action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personals_and_Dating action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Phishing_and_Other_Frauds action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Political_Organizations action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Damaging_Content action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Exploited_Documents action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Unwanted_Software action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Private_IP_Addresses action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Proxy_Avoidance action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Racism_and_Hate action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Security action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex_Education action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_Networking_and_Personal_Sites action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_and_Affiliation_Organizations action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sport_Hunting_and_Gun_Clubs action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Streaming_Media action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Supplements_and_Unregulated_Compounds action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Surveillance action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Content action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Embedded_Link action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Tasteless action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Text_and_Media_Messaging action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Unauthorized_Mobile_Marketplaces action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Chat action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Collaboration action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Hosting action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_and_Email_Spam action log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF default log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings default log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings server-connectivity log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings timeout log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings too-many-requests log-and-permit
set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF timeout 3

# Anti virus: sophos engine
set security utm feature-profile anti-virus type sophos-engine
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options default log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options content-size log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options out-of-resources log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options timeout log-and-permit
set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options too-many-requests log-and-permit
set security utm utm-policy UTM-POC anti-virus http-profile EVAL-AV

#


IDP
idp config
set security idp idp-policy Recommended rulebase-ips rule 1 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 1 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 1 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 1 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 1 match application default
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Major"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Major"
set security idp idp-policy Recommended rulebase-ips rule 1 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 1 then notification log-attacks

set security idp idp-policy Recommended rulebase-ips rule 2 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 2 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 2 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 2 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 2 match application default
set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Major"
set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 2 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 2 then notification log-attacks

set security idp idp-policy Recommended rulebase-ips rule 3 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 3 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 3 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 3 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 3 match application default
set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Major"
set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 3 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 3 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 4 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 4 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 4 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 4 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 4 match application default
set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Major"
set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 4 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 4 then notification log-attacks

set security idp idp-policy Recommended rulebase-ips rule 5 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 5 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 5 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 5 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 5 match application default
set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Critical"
set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Minor"
set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Major"
set security idp idp-policy Recommended rulebase-ips rule 5 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 5 then notification log-attacks
set security idp idp-policy Recommended rulebase-ips rule 6 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 6 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 6 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 6 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 6 match application default
set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Minor"
set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Major"
set security idp idp-policy Recommended rulebase-ips rule 6 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 6 then notification log-attacks

set security idp idp-policy Recommended rulebase-ips rule 7 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 7 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 7 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 7 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 7 match application default
set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Critical"
set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Minor"
set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Major"
set security idp idp-policy Recommended rulebase-ips rule 7 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 7 then notification log-attacks

set security idp idp-policy Recommended rulebase-ips rule 8 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 8 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 8 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 8 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 8 match application default
set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Critical"
set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Major"
set security idp idp-policy Recommended rulebase-ips rule 8 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 8 then notification log-attacks

set security idp idp-policy Recommended rulebase-ips rule 9 match from-zone any
set security idp idp-policy Recommended rulebase-ips rule 9 match source-address any
set security idp idp-policy Recommended rulebase-ips rule 9 match to-zone any
set security idp idp-policy Recommended rulebase-ips rule 9 match destination-address any
set security idp idp-policy Recommended rulebase-ips rule 9 match application default
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Critical"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Major"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Minor"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Critical"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Major"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Minor"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Critical"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Major"
set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Minor"
set security idp idp-policy Recommended rulebase-ips rule 9 then action no-action
set security idp idp-policy Recommended rulebase-ips rule 9 then notification log-attacks

set security idp active-policy Recommended
set security idp sensor-configuration flow idp-bypass-cpu-usg-overload
Security-intelligence
secintel
set services security-intelligence profile feeds-cc-p1 category CC
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 6
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 7
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 8
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 9
set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 10
set services security-intelligence profile feeds-cc-p1 rule 1 then action recommended
set services security-intelligence profile feeds-cc-p1 rule 1 then log
set services security-intelligence profile feeds-cc-p1 default-rule then action permit
set services security-intelligence profile feeds-cc-p1 default-rule then log
set services security-intelligence profile Inf-Hosts category Infected-Hosts
set services security-intelligence profile Inf-Hosts rule 1 match threat-level 9
set services security-intelligence profile Inf-Hosts rule 1 match threat-level 10
set services security-intelligence profile Inf-Hosts rule 1 then action permit
set services security-intelligence profile Inf-Hosts rule 1 then log
set services security-intelligence profile Inf-Hosts default-rule then action permit
set services security-intelligence profile Inf-Hosts default-rule then log
set services security-intelligence policy pol-cc CC feeds-cc-p1
set services security-intelligence policy pol-cc Infected-Hosts Inf-Hosts
Sky ATP / anti-malware
Sky-ATP - Anti malware
set services advanced-anti-malware policy skypolicy1 match application HTTP
set services advanced-anti-malware policy skypolicy1 match verdict-threshold 6
set services advanced-anti-malware policy skypolicy1 then action block
set services advanced-anti-malware policy skypolicy1 then notification log
set services advanced-anti-malware policy skypolicy1 inspection-profile atp_all_profile
set services advanced-anti-malware policy skypolicy1 fallback-options action permit
set services advanced-anti-malware policy skypolicy1 fallback-options notification log
set services advanced-anti-malware policy skypolicy1 whitelist-notification log
set services advanced-anti-malware policy skypolicy1 blacklist-notification log
Zones and security policies
Zone & Policies
#Zones
# Inline Zone
set security zones security-zone Inline host-inbound-traffic protocols all 
set security zones security-zone Inline host-inbound-traffic system-services all 
set security zones security-zone Inline interfaces ge-0/0/2.0
set security zones security-zone Inline interfaces ge-0/0/3.0
set security zones security-zone Inline application-tracking

# Sniffer Zone
set security zones security-zone Sniffer host-inbound-traffic protocols all 
set security zones security-zone Sniffer host-inbound-traffic system-services all 
set security zones security-zone Sniffer interfaces ge-0/0/1.0
set security zones security-zone Sniffer application-tracking

# LAN-ACCESS Zone
set security zones security-zone LAN-ACCESS host-inbound-traffic protocols all 
set security zones security-zone LAN-ACCESS interfaces ge-0/0/0.0
set security zones security-zone LAN-ACCESS host-inbound-traffic system-services all


# Security Policies: 
# Sniffer ---> Sniffer
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match source-address any
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match destination-address any
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match application any
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services idp
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services utm-policy UTM-POC
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then log session-close
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services advanced-anti-malware-policy skypolicy1
set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services security-intelligence-policy pol-cc

#Inline to-zone Inline
set security policies from-zone Inline to-zone Inline policy Inline1 match source-address any
set security policies from-zone Inline to-zone Inline policy Inline1 match destination-address any
set security policies from-zone Inline to-zone Inline policy Inline1 match application any
set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services idp
set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services utm-policy UTM-POC
set security policies from-zone Inline to-zone Inline policy Inline1 then log session-close
set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services advanced-anti-malware-policy skypolicy1
set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services security-intelligence-policy pol-cc

syslog & security log
security log and syslog
#
set security log mode stream
set security log format sd-syslog
set security log source-interface ge-0/0/0.0 
set security log transport protocol tls
set security log transport tls-profile ssli
set security log transport protocol tls tcp-connections 1

set security log mode stream transport protocol tls tls-profile skyenterprise tcp-connections 1

set security log stream skyenterprise severity debug category all
set security log stream skyenterprise rate-limit 300
set security log stream skyenterprise format sd-syslog host 138.68.58.31 port 5390
set security log stream skyenterprise host 138.68.58.31
set security log stream skyenterprise host port 5390
set security log stream skyenterprise format sd-syslog

set security log source-interface ge-0/0/0.0

#syslog
set system syslog archive size 100k
set system syslog archive files 3
set system syslog user * any emergency
set system syslog file messages any critical
set system syslog file messages authorization info


management and outbound-ssh and ssl services
system , outband and
set system host-name SRXbuffalo
set system name-server 8.8.8.8
set system name-server 8.8.4.4

set system services ssh
set system services web-management https interface ge-0/0/0.0
set system services web-management https system-generated-certificate
set system services ssh protocol-version v2

set system max-configurations-on-flash 5
set system max-configuration-rollbacks 5
set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
set system name-resolution no-resolve-on-input
set system ntp server 0.pool.ntp.org
set system ntp server 1.pool.ntp.org

set system login announcement "BUFFALO GOLDEN CONFIG V2.6"
set system login user skyenterprise class super-user authentication encrypted-password $1$skyenter$WMnIWq2WYm.98cHNXXM/D.



delete system autoinstallation
set chassis alarm management-ethernet link-down ignore  


set system services outbound-ssh client skyenterprise-ncd01 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7
set system services outbound-ssh client skyenterprise-ncd01 services netconf keep-alive retry 3 timeout 5
set system services outbound-ssh client skyenterprise-ncd01 skyent-ncd01.juniper.net port 4087 timeout 60 retry 1000
set system services outbound-ssh client skyenterprise-ncd02 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7
set system services outbound-ssh client skyenterprise-ncd02 services netconf keep-alive retry 3 timeout 5
set system services outbound-ssh client skyenterprise-ncd02 skyent-ncd02.juniper.net port 4087 timeout 60 retry 1000

set services ssl initiation profile ssli protocol-version all
set services ssl initiation profile ssli actions ignore-server-auth-failure 
set services ssl initiation profile ssli trusted-ca all
set services ssl initiation profile ssli actions crl disable
set services ssl initiation profile skyenterprise protocol-version all actions ignore-server-auth-failure crl disable
Interface and vlan
interface and vlan
set interfaces ge-0/0/0 unit 0 family inet dhcp
set interfaces ge-0/0/0 description " Outbound interface to the Internet "

set interfaces ge-0/0/1 promiscuous-mode
set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24
set interfaces ge-0/0/1 description " Tap Mode "
set interfaces ge-0/0/1 unit 0 family inet address 192.168.255.1/24 arp 192.168.255.254 mac 00:00:01:01:01:01

set interfaces ge-0/0/2 unit 0 family ethernet-switching vlan members eval
set interfaces ge-0/0/3 unit 0 family ethernet-switching vlan members eval
set interfaces ge-0/0/2 unit 0 family ethernet-switching interface-mode access 
set interfaces ge-0/0/3 unit 0 family ethernet-switching interface-mode access

set vlans eval vlan-id 10
virutal router
VR
set routing-instances Sniffer instance-type virtual-router
set routing-instances Sniffer routing-options static route 0.0.0.0/0 next-hop 192.168.255.254
set routing-instances Sniffer interface ge-0/0/1.0
flow tcp-session, application-tracking , forwarding-process
ssss
set services application-identification

set security application-tracking
set security application-tracking session-update-interval 180
set security flow tcp-session no-syn-check
set security flow tcp-session no-sequence-check
set security forwarding-process enhanced-services-mode


Related content

OneConfig Buffalo Project
OneConfig Buffalo Project
More like this
AJSEC Lab9 Log Director
AJSEC Lab9 Log Director
More like this
Install Log Collector
Install Log Collector
More like this
security log or Data Plan logging
security log or Data Plan logging
More like this
syslog and security log format
syslog and security log format
More like this
srx320 config 2024-09-23
srx320 config 2024-09-23
More like this