/
script for the creation of ANR report
script for the creation of ANR report
Jean-luc KRIKER
Owned by Jean-luc KRIKER
Full script |
full script Expand source
delete set system host-name SRXbuffalo set system name-server 8.8.8.8 set system name-server 8.8.4.4 set system services ssh set system services web-management https interface ge-0/0/0.0 set system services web-management https system-generated-certificate set system syslog archive size 100k set system login announcement "BUFFALO GOLDEN CONFIG V2.6" set system syslog archive files 3 set system syslog user * any emergency set system syslog file messages any critical set system syslog file messages authorization info set system max-configurations-on-flash 5 set system max-configuration-rollbacks 5 set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval set system name-resolution no-resolve-on-input set system ntp server 0.pool.ntp.org set system ntp server 1.pool.ntp.org set services ssl initiation profile ssli protocol-version all set services ssl initiation profile ssli actions ignore-server-auth-failure set services ssl initiation profile ssli trusted-ca all set services ssl initiation profile ssli actions crl disable set security log mode stream set security log format sd-syslog set security log source-interface ge-0/0/0.0 set security log transport protocol tls set security log transport tls-profile ssli set security log transport protocol tls tcp-connections 1 set interfaces ge-0/0/0 unit 0 family inet dhcp set interfaces ge-0/0/0 description " Outbound interface to the Internet " set security zones security-zone LAN-ACCESS host-inbound-traffic protocols all set security zones security-zone LAN-ACCESS interfaces ge-0/0/0.0 set security zones security-zone LAN-ACCESS host-inbound-traffic system-services all delete system autoinstallation set chassis alarm management-ethernet link-down ignore set interfaces ge-0/0/1 promiscuous-mode set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24 set interfaces ge-0/0/1 description " Tap Mode " set interfaces ge-0/0/1 unit 0 family inet address 192.168.255.1/24 arp 192.168.255.254 mac 00:00:01:01:01:01 set routing-instances Sniffer instance-type virtual-router set routing-instances Sniffer routing-options static route 0.0.0.0/0 next-hop 192.168.255.254 set routing-instances Sniffer interface ge-0/0/1.0 set vlans eval vlan-id 10 set interfaces ge-0/0/2 unit 0 family ethernet-switching vlan members eval set interfaces ge-0/0/3 unit 0 family ethernet-switching vlan members eval set interfaces ge-0/0/2 unit 0 family ethernet-switching interface-mode access set interfaces ge-0/0/3 unit 0 family ethernet-switching interface-mode access set services application-identification set security application-tracking set security application-tracking session-update-interval 180 set security flow tcp-session no-syn-check set security flow tcp-session no-sequence-check set security forwarding-process enhanced-services-mode set security zones security-zone Sniffer host-inbound-traffic protocols all set security zones security-zone Sniffer host-inbound-traffic system-services all set security zones security-zone Sniffer interfaces ge-0/0/1.0 set security zones security-zone Sniffer application-tracking set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match source-address any set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match destination-address any set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match application any set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services idp set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services utm-policy UTM-POC set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then log session-close set security zones security-zone Inline host-inbound-traffic protocols all set security zones security-zone Inline host-inbound-traffic system-services all set security zones security-zone Inline interfaces ge-0/0/2.0 set security zones security-zone Inline interfaces ge-0/0/3.0 set security zones security-zone Inline application-tracking set security policies from-zone Inline to-zone Inline policy Inline1 match source-address any set security policies from-zone Inline to-zone Inline policy Inline1 match destination-address any set security policies from-zone Inline to-zone Inline policy Inline1 match application any set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services idp set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services utm-policy UTM-POC set security policies from-zone Inline to-zone Inline policy Inline1 then log session-close set security utm feature-profile web-filtering type juniper-enhanced set security utm utm-policy UTM-POC web-filtering http-profile EVAL-EWF set security utm utm-policy UTM-POC traffic-options sessions-per-client over-limit log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Bot_Networks action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Weapons action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Web_Sites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Material action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Command_and_Control action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Payloads action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Violence action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Drugs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Alcohol_and_Tobacco action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Gambling action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Keyloggers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_Link action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_iFrame action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Spyware action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Mobile_Malware action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Abused_Drugs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Application_and_Software_Download action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Compromised_Websites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Custom_Encrypted_Payloads action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_DNS action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Elevated_Exposure action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Emerging_Exploits action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Entertainment_Video action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Extended_Protection action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_File_Download_Servers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Files_Containing_Passwords action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Freeware_and_Software_Download action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Games action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Hacking action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Illegal_or_Questionable action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Image_Servers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Instant_Messaging action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Internet_Radio_and_TV action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Intolerance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Lingerie_and_Swimsuit action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_MP3_and_Audio_Download_Services action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Marijuana action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Militancy_and_Extremist action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Military action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Network_Errors action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Newly_Registered_Websites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_News_and_Media action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions_and_Occult_and_Folklore action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Nudity action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Online_Brokerage_and_Trading action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Organizational_Email action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Pay_to_Surf action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Peer_to_Peer_File_Sharing action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personal_Network_Storage_and_Backup action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personals_and_Dating action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Phishing_and_Other_Frauds action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Political_Organizations action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Damaging_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Exploited_Documents action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Unwanted_Software action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Private_IP_Addresses action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Proxy_Avoidance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Racism_and_Hate action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Security action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex_Education action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_Networking_and_Personal_Sites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_and_Affiliation_Organizations action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sport_Hunting_and_Gun_Clubs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Streaming_Media action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Supplements_and_Unregulated_Compounds action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Surveillance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Embedded_Link action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Tasteless action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Text_and_Media_Messaging action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Unauthorized_Mobile_Marketplaces action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Chat action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Collaboration action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Hosting action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_and_Email_Spam action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF default log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings default log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings server-connectivity log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings timeout log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings too-many-requests log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF timeout 3 set security idp idp-policy Recommended rulebase-ips rule 1 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 1 match source-address any set security idp idp-policy Recommended rulebase-ips rule 1 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 1 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 1 match application default set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Critical" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Minor" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Major" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Critical" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Minor" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Major" set security idp idp-policy Recommended rulebase-ips rule 1 then action no-action set security idp idp-policy Recommended rulebase-ips rule 1 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 2 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 2 match source-address any set security idp idp-policy Recommended rulebase-ips rule 2 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 2 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 2 match application default set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Major" set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Minor" set security idp idp-policy Recommended rulebase-ips rule 2 then action no-action set security idp idp-policy Recommended rulebase-ips rule 2 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 3 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 3 match source-address any set security idp idp-policy Recommended rulebase-ips rule 3 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 3 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 3 match application default set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Major" set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 3 then action no-action set security idp idp-policy Recommended rulebase-ips rule 3 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 4 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 4 match source-address any set security idp idp-policy Recommended rulebase-ips rule 4 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 4 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 4 match application default set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Major" set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 4 then action no-action set security idp idp-policy Recommended rulebase-ips rule 4 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 5 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 5 match source-address any set security idp idp-policy Recommended rulebase-ips rule 5 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 5 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 5 match application default set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Critical" set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Minor" set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Major" set security idp idp-policy Recommended rulebase-ips rule 5 then action no-action set security idp idp-policy Recommended rulebase-ips rule 5 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 6 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 6 match source-address any set security idp idp-policy Recommended rulebase-ips rule 6 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 6 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 6 match application default set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Major" set security idp idp-policy Recommended rulebase-ips rule 6 then action no-action set security idp idp-policy Recommended rulebase-ips rule 6 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 7 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 7 match source-address any set security idp idp-policy Recommended rulebase-ips rule 7 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 7 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 7 match application default set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Critical" set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Minor" set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Major" set security idp idp-policy Recommended rulebase-ips rule 7 then action no-action set security idp idp-policy Recommended rulebase-ips rule 7 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 8 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 8 match source-address any set security idp idp-policy Recommended rulebase-ips rule 8 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 8 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 8 match application default set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Critical" set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Major" set security idp idp-policy Recommended rulebase-ips rule 8 then action no-action set security idp idp-policy Recommended rulebase-ips rule 8 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 9 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 9 match source-address any set security idp idp-policy Recommended rulebase-ips rule 9 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 9 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 9 match application default set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 then action no-action set security idp idp-policy Recommended rulebase-ips rule 9 then notification log-attacks set security idp active-policy Recommended set security idp sensor-configuration flow idp-bypass-cpu-usg-overload set services advanced-anti-malware policy skypolicy1 match application HTTP set services advanced-anti-malware policy skypolicy1 match verdict-threshold 6 set services advanced-anti-malware policy skypolicy1 then action block set services advanced-anti-malware policy skypolicy1 then notification log set services advanced-anti-malware policy skypolicy1 inspection-profile atp_all_profile set services advanced-anti-malware policy skypolicy1 fallback-options action permit set services advanced-anti-malware policy skypolicy1 fallback-options notification log set services advanced-anti-malware policy skypolicy1 whitelist-notification log set services advanced-anti-malware policy skypolicy1 blacklist-notification log set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services advanced-anti-malware-policy skypolicy1 set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services advanced-anti-malware-policy skypolicy1 set services security-intelligence profile feeds-cc-p1 category CC set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 6 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 7 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 8 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 9 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 10 set services security-intelligence profile feeds-cc-p1 rule 1 then action recommended set services security-intelligence profile feeds-cc-p1 rule 1 then log set services security-intelligence profile feeds-cc-p1 default-rule then action permit set services security-intelligence profile feeds-cc-p1 default-rule then log set services security-intelligence profile Inf-Hosts category Infected-Hosts set services security-intelligence profile Inf-Hosts rule 1 match threat-level 9 set services security-intelligence profile Inf-Hosts rule 1 match threat-level 10 set services security-intelligence profile Inf-Hosts rule 1 then action permit set services security-intelligence profile Inf-Hosts rule 1 then log set services security-intelligence profile Inf-Hosts default-rule then action permit set services security-intelligence profile Inf-Hosts default-rule then log set services security-intelligence policy pol-cc CC feeds-cc-p1 set services security-intelligence policy pol-cc Infected-Hosts Inf-Hosts set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services security-intelligence-policy pol-cc set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services security-intelligence-policy pol-cc set security utm feature-profile anti-virus type sophos-engine set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options default log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options content-size log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options out-of-resources log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options timeout log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options too-many-requests log-and-permit set security utm utm-policy UTM-POC anti-virus http-profile EVAL-AV set security log stream skyenterprise host 138.68.58.31 set security log stream skyenterprise host port 5390 set security log stream skyenterprise format sd-syslog set system services ssh protocol-version v2 set system login user skyenterprise class super-user authentication encrypted-password $1$skyenter$WMnIWq2WYm.98cHNXXM/D. set system services outbound-ssh client skyenterprise-ncd01 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7 set system services outbound-ssh client skyenterprise-ncd01 services netconf keep-alive retry 3 timeout 5 set system services outbound-ssh client skyenterprise-ncd01 skyent-ncd01.juniper.net port 4087 timeout 60 retry 1000 set system services outbound-ssh client skyenterprise-ncd02 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7 set system services outbound-ssh client skyenterprise-ncd02 services netconf keep-alive retry 3 timeout 5 set system services outbound-ssh client skyenterprise-ncd02 skyent-ncd02.juniper.net port 4087 timeout 60 retry 1000 set security log mode stream transport protocol tls tls-profile skyenterprise tcp-connections 1 set security log stream skyenterprise severity debug category all set security log stream skyenterprise rate-limit 300 set services ssl initiation profile skyenterprise protocol-version all actions ignore-server-auth-failure crl disable set security log stream skyenterprise format sd-syslog host 138.68.58.31 port 5390 ### Customize your source-interface for on device setup (uncomment next line) set security log source-interface ge-0/0/0.0 |
UTM: web-filtering anti-virus |
UTM config Expand source
set security utm feature-profile web-filtering type juniper-enhanced set security utm utm-policy UTM-POC web-filtering http-profile EVAL-EWF set security utm utm-policy UTM-POC traffic-options sessions-per-client over-limit log-and-permit # web-filtering profile EVAL-EWF set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Bot_Networks action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Weapons action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Web_Sites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Adult_Material action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Command_and_Control action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Advanced_Malware_Payloads action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Violence action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Drugs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Alcohol_and_Tobacco action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Gambling action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Keyloggers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_Link action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Malicious_Embedded_iFrame action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Spyware action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Mobile_Malware action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Abused_Drugs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Application_and_Software_Download action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Compromised_Websites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Custom_Encrypted_Payloads action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Dynamic_DNS action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Elevated_Exposure action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Emerging_Exploits action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Entertainment_Video action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Extended_Protection action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_File_Download_Servers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Files_Containing_Passwords action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Freeware_and_Software_Download action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Games action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Hacking action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Illegal_or_Questionable action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Image_Servers action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Instant_Messaging action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Internet_Radio_and_TV action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Intolerance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Lingerie_and_Swimsuit action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_MP3_and_Audio_Download_Services action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Marijuana action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Militancy_and_Extremist action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Military action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Network_Errors action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Newly_Registered_Websites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_News_and_Media action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Non_Traditional_Religions_and_Occult_and_Folklore action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Nudity action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Online_Brokerage_and_Trading action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Organizational_Email action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Pay_to_Surf action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Peer_to_Peer_File_Sharing action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personal_Network_Storage_and_Backup action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Personals_and_Dating action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Phishing_and_Other_Frauds action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Political_Organizations action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Damaging_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Exploited_Documents action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Potentially_Unwanted_Software action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Private_IP_Addresses action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Proxy_Avoidance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Racism_and_Hate action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Security action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sex_Education action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_Networking_and_Personal_Sites action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Social_and_Affiliation_Organizations action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Sport_Hunting_and_Gun_Clubs action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Streaming_Media action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Supplements_and_Unregulated_Compounds action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Surveillance action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Content action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Suspicious_Embedded_Link action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Tasteless action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Text_and_Media_Messaging action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Unauthorized_Mobile_Marketplaces action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Chat action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Collaboration action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_Hosting action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF category Enhanced_Web_and_Email_Spam action log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF default log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings default log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings server-connectivity log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings timeout log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF fallback-settings too-many-requests log-and-permit set security utm feature-profile web-filtering juniper-enhanced profile EVAL-EWF timeout 3 # Anti virus: sophos engine set security utm feature-profile anti-virus type sophos-engine set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options default log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options content-size log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options engine-not-ready log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options out-of-resources log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options timeout log-and-permit set security utm feature-profile anti-virus sophos-engine profile EVAL-AV fallback-options too-many-requests log-and-permit set security utm utm-policy UTM-POC anti-virus http-profile EVAL-AV # |
IDP |
idp config Expand source
set security idp idp-policy Recommended rulebase-ips rule 1 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 1 match source-address any set security idp idp-policy Recommended rulebase-ips rule 1 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 1 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 1 match application default set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Critical" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Minor" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]IP - Major" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Critical" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Minor" set security idp idp-policy Recommended rulebase-ips rule 1 match attacks predefined-attack-groups "[Recommended]TCP - Major" set security idp idp-policy Recommended rulebase-ips rule 1 then action no-action set security idp idp-policy Recommended rulebase-ips rule 1 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 2 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 2 match source-address any set security idp idp-policy Recommended rulebase-ips rule 2 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 2 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 2 match application default set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Major" set security idp idp-policy Recommended rulebase-ips rule 2 match attacks predefined-attack-groups "[Recommended]ICMP - Minor" set security idp idp-policy Recommended rulebase-ips rule 2 then action no-action set security idp idp-policy Recommended rulebase-ips rule 2 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 3 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 3 match source-address any set security idp idp-policy Recommended rulebase-ips rule 3 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 3 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 3 match application default set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Major" set security idp idp-policy Recommended rulebase-ips rule 3 match attacks predefined-attack-groups "[Recommended]HTTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 3 then action no-action set security idp idp-policy Recommended rulebase-ips rule 3 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 4 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 4 match source-address any set security idp idp-policy Recommended rulebase-ips rule 4 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 4 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 4 match application default set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Major" set security idp idp-policy Recommended rulebase-ips rule 4 match attacks predefined-attack-groups "[Recommended]SMTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 4 then action no-action set security idp idp-policy Recommended rulebase-ips rule 4 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 5 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 5 match source-address any set security idp idp-policy Recommended rulebase-ips rule 5 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 5 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 5 match application default set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Critical" set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Minor" set security idp idp-policy Recommended rulebase-ips rule 5 match attacks predefined-attack-groups "[Recommended]DNS - Major" set security idp idp-policy Recommended rulebase-ips rule 5 then action no-action set security idp idp-policy Recommended rulebase-ips rule 5 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 6 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 6 match source-address any set security idp idp-policy Recommended rulebase-ips rule 6 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 6 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 6 match application default set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Critical" set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Minor" set security idp idp-policy Recommended rulebase-ips rule 6 match attacks predefined-attack-groups "[Recommended]FTP - Major" set security idp idp-policy Recommended rulebase-ips rule 6 then action no-action set security idp idp-policy Recommended rulebase-ips rule 6 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 7 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 7 match source-address any set security idp idp-policy Recommended rulebase-ips rule 7 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 7 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 7 match application default set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Critical" set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Minor" set security idp idp-policy Recommended rulebase-ips rule 7 match attacks predefined-attack-groups "[Recommended]POP3 - Major" set security idp idp-policy Recommended rulebase-ips rule 7 then action no-action set security idp idp-policy Recommended rulebase-ips rule 7 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 8 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 8 match source-address any set security idp idp-policy Recommended rulebase-ips rule 8 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 8 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 8 match application default set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Critical" set security idp idp-policy Recommended rulebase-ips rule 8 match attacks predefined-attack-groups "[Recommended]IMAP - Major" set security idp idp-policy Recommended rulebase-ips rule 8 then action no-action set security idp idp-policy Recommended rulebase-ips rule 8 then notification log-attacks set security idp idp-policy Recommended rulebase-ips rule 9 match from-zone any set security idp idp-policy Recommended rulebase-ips rule 9 match source-address any set security idp idp-policy Recommended rulebase-ips rule 9 match to-zone any set security idp idp-policy Recommended rulebase-ips rule 9 match destination-address any set security idp idp-policy Recommended rulebase-ips rule 9 match application default set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]TROJAN - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]VIRUS - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Critical" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Major" set security idp idp-policy Recommended rulebase-ips rule 9 match attacks predefined-attack-groups "[Recommended]WORM - Minor" set security idp idp-policy Recommended rulebase-ips rule 9 then action no-action set security idp idp-policy Recommended rulebase-ips rule 9 then notification log-attacks set security idp active-policy Recommended set security idp sensor-configuration flow idp-bypass-cpu-usg-overload |
Security-intelligence |
secintel Expand source
set services security-intelligence profile feeds-cc-p1 category CC set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 6 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 7 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 8 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 9 set services security-intelligence profile feeds-cc-p1 rule 1 match threat-level 10 set services security-intelligence profile feeds-cc-p1 rule 1 then action recommended set services security-intelligence profile feeds-cc-p1 rule 1 then log set services security-intelligence profile feeds-cc-p1 default-rule then action permit set services security-intelligence profile feeds-cc-p1 default-rule then log set services security-intelligence profile Inf-Hosts category Infected-Hosts set services security-intelligence profile Inf-Hosts rule 1 match threat-level 9 set services security-intelligence profile Inf-Hosts rule 1 match threat-level 10 set services security-intelligence profile Inf-Hosts rule 1 then action permit set services security-intelligence profile Inf-Hosts rule 1 then log set services security-intelligence profile Inf-Hosts default-rule then action permit set services security-intelligence profile Inf-Hosts default-rule then log set services security-intelligence policy pol-cc CC feeds-cc-p1 set services security-intelligence policy pol-cc Infected-Hosts Inf-Hosts |
Sky ATP / anti-malware |
Sky-ATP - Anti malware Expand source
set services advanced-anti-malware policy skypolicy1 match application HTTP set services advanced-anti-malware policy skypolicy1 match verdict-threshold 6 set services advanced-anti-malware policy skypolicy1 then action block set services advanced-anti-malware policy skypolicy1 then notification log set services advanced-anti-malware policy skypolicy1 inspection-profile atp_all_profile set services advanced-anti-malware policy skypolicy1 fallback-options action permit set services advanced-anti-malware policy skypolicy1 fallback-options notification log set services advanced-anti-malware policy skypolicy1 whitelist-notification log set services advanced-anti-malware policy skypolicy1 blacklist-notification log |
Zones and security policies |
Zone & Policies Expand source
#Zones # Inline Zone set security zones security-zone Inline host-inbound-traffic protocols all set security zones security-zone Inline host-inbound-traffic system-services all set security zones security-zone Inline interfaces ge-0/0/2.0 set security zones security-zone Inline interfaces ge-0/0/3.0 set security zones security-zone Inline application-tracking # Sniffer Zone set security zones security-zone Sniffer host-inbound-traffic protocols all set security zones security-zone Sniffer host-inbound-traffic system-services all set security zones security-zone Sniffer interfaces ge-0/0/1.0 set security zones security-zone Sniffer application-tracking # LAN-ACCESS Zone set security zones security-zone LAN-ACCESS host-inbound-traffic protocols all set security zones security-zone LAN-ACCESS interfaces ge-0/0/0.0 set security zones security-zone LAN-ACCESS host-inbound-traffic system-services all # Security Policies: # Sniffer ---> Sniffer set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match source-address any set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match destination-address any set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 match application any set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services idp set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services utm-policy UTM-POC set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then log session-close set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services advanced-anti-malware-policy skypolicy1 set security policies from-zone Sniffer to-zone Sniffer policy Sniffer1 then permit application-services security-intelligence-policy pol-cc #Inline to-zone Inline set security policies from-zone Inline to-zone Inline policy Inline1 match source-address any set security policies from-zone Inline to-zone Inline policy Inline1 match destination-address any set security policies from-zone Inline to-zone Inline policy Inline1 match application any set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services idp set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services utm-policy UTM-POC set security policies from-zone Inline to-zone Inline policy Inline1 then log session-close set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services advanced-anti-malware-policy skypolicy1 set security policies from-zone Inline to-zone Inline policy Inline1 then permit application-services security-intelligence-policy pol-cc |
syslog & security log |
security log and syslog Expand source
# set security log mode stream set security log format sd-syslog set security log source-interface ge-0/0/0.0 set security log transport protocol tls set security log transport tls-profile ssli set security log transport protocol tls tcp-connections 1 set security log mode stream transport protocol tls tls-profile skyenterprise tcp-connections 1 set security log stream skyenterprise severity debug category all set security log stream skyenterprise rate-limit 300 set security log stream skyenterprise format sd-syslog host 138.68.58.31 port 5390 set security log stream skyenterprise host 138.68.58.31 set security log stream skyenterprise host port 5390 set security log stream skyenterprise format sd-syslog set security log source-interface ge-0/0/0.0 #syslog set system syslog archive size 100k set system syslog archive files 3 set system syslog user * any emergency set system syslog file messages any critical set system syslog file messages authorization info |
management and outbound-ssh and ssl services | system , outband and set system host-name SRXbuffalo set system name-server 8.8.8.8 set system name-server 8.8.4.4 set system services ssh set system services web-management https interface ge-0/0/0.0 set system services web-management https system-generated-certificate set system services ssh protocol-version v2 set system max-configurations-on-flash 5 set system max-configuration-rollbacks 5 set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval set system name-resolution no-resolve-on-input set system ntp server 0.pool.ntp.org set system ntp server 1.pool.ntp.org set system login announcement "BUFFALO GOLDEN CONFIG V2.6" set system login user skyenterprise class super-user authentication encrypted-password $1$skyenter$WMnIWq2WYm.98cHNXXM/D. delete system autoinstallation set chassis alarm management-ethernet link-down ignore set system services outbound-ssh client skyenterprise-ncd01 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7 set system services outbound-ssh client skyenterprise-ncd01 services netconf keep-alive retry 3 timeout 5 set system services outbound-ssh client skyenterprise-ncd01 skyent-ncd01.juniper.net port 4087 timeout 60 retry 1000 set system services outbound-ssh client skyenterprise-ncd02 device-id srx300_srx_evaluation-jnprjkriker secret bc408379a6dacfd1d4c597dbb837acc7 set system services outbound-ssh client skyenterprise-ncd02 services netconf keep-alive retry 3 timeout 5 set system services outbound-ssh client skyenterprise-ncd02 skyent-ncd02.juniper.net port 4087 timeout 60 retry 1000 set services ssl initiation profile ssli protocol-version all set services ssl initiation profile ssli actions ignore-server-auth-failure set services ssl initiation profile ssli trusted-ca all set services ssl initiation profile ssli actions crl disable set services ssl initiation profile skyenterprise protocol-version all actions ignore-server-auth-failure crl disable |
Interface and vlan |
interface and vlan Expand source
set interfaces ge-0/0/0 unit 0 family inet dhcp set interfaces ge-0/0/0 description " Outbound interface to the Internet " set interfaces ge-0/0/1 promiscuous-mode set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24 set interfaces ge-0/0/1 description " Tap Mode " set interfaces ge-0/0/1 unit 0 family inet address 192.168.255.1/24 arp 192.168.255.254 mac 00:00:01:01:01:01 set interfaces ge-0/0/2 unit 0 family ethernet-switching vlan members eval set interfaces ge-0/0/3 unit 0 family ethernet-switching vlan members eval set interfaces ge-0/0/2 unit 0 family ethernet-switching interface-mode access set interfaces ge-0/0/3 unit 0 family ethernet-switching interface-mode access set vlans eval vlan-id 10 |
virutal router |
VR Expand source
set routing-instances Sniffer instance-type virtual-router set routing-instances Sniffer routing-options static route 0.0.0.0/0 next-hop 192.168.255.254 set routing-instances Sniffer interface ge-0/0/1.0 |
flow tcp-session, application-tracking , forwarding-process |
ssss Expand source
set services application-identification set security application-tracking set security application-tracking session-update-interval 180 set security flow tcp-session no-syn-check set security flow tcp-session no-sequence-check set security forwarding-process enhanced-services-mode |
, multiple selections available,
Related content
OneConfig Buffalo Project
OneConfig Buffalo Project
More like this
AJSEC Lab9 Log Director
AJSEC Lab9 Log Director
More like this
Install Log Collector
Install Log Collector
More like this
security log or Data Plan logging
security log or Data Plan logging
More like this
syslog and security log format
syslog and security log format
More like this
srx320 config 2024-09-23
srx320 config 2024-09-23
More like this