Sie sind auf Seite 1von 122

Junos OS

UTM Sophos Antivirus Protection for Security


Devices
Release
12.1
Published: 2012-08-30
Copyright 2012, Juniper Networks, Inc.
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, California 94089
USA
408-745-2000
www.juniper.net
This product includes the Envoy SNMPEngine, developedby Epilogue Technology, an IntegratedSystems Company. Copyright 1986-1997,
Epilogue Technology Corporation. All rights reserved. This programand its documentation were developed at private expense, and no part
of themis in the public domain.
This product includes memory allocation software developed by Mark Moraes, copyright 1988, 1989, 1993, University of Toronto.
This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation
and software included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by the Regents of the University of California. Copyright
1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994. The Regents of the University of California. All rights reserved.
GateD software copyright 1995, the Regents of the University. All rights reserved. Gate Daemon was originated and developed through
release 3.0 by Cornell University and its collaborators. Gated is based on Kirtons EGP, UC Berkeleys routing daemon (routed), and DCNs
HELLOrouting protocol. Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD
software copyright 1988, Regents of the University of California. All rights reserved. Portions of the GateD software copyright 1991, D.
L. S. Associates.
This product includes software developed by Maker Communications, Inc., copyright 1996, 1997, Maker Communications, Inc.
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are
owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312,
6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Junos OS UTMSophos Antivirus Protection for Security Devices
12.1
Copyright 2012, Juniper Networks, Inc.
All rights reserved.
The information in this document is current as of the date on the title page.
YEAR 2000 NOTICE
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
year 2038. However, the NTP application is known to have some difficulty in the year 2036.
ENDUSER LICENSE AGREEMENT
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
software. Use of such software is subject to the terms and conditions of the End User License Agreement (EULA) posted at
http://www.juniper.net/support/eula.html. By downloading, installing or using such software, you agree to the terms and conditions
of that EULA.
Copyright 2012, Juniper Networks, Inc. ii
Table of Contents
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Documentation and Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Using the Examples in This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Merging a Full Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Merging a Snippet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Documentation Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Requesting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Self-Help Online Tools and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Opening a Case with JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Part 1 Overview
Chapter 1 Supported Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Unified Threat Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Chapter 2 Sophos Antivirus Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Sophos Antivirus Protection Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Sophos Antivirus Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Understanding Sophos Antivirus Data File Update . . . . . . . . . . . . . . . . . . . . . . . . . 6
Comparison of Sophos Antivirus to Kaspersky Antivirus . . . . . . . . . . . . . . . . . . . . . 7
Part 2 Configuration
Chapter 3 Sophos Antivirus Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Sophos Antivirus Configuration Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Example: Configuring Sophos Antivirus Custom Objects . . . . . . . . . . . . . . . . . . . . 11
Example: Configuring Sophos Antivirus Feature Profile . . . . . . . . . . . . . . . . . . . . . 15
Example: Configuring Sophos Antivirus UTM Policies . . . . . . . . . . . . . . . . . . . . . . . 21
Example: Configuring Sophos Antivirus Firewall Security Policies . . . . . . . . . . . . . 22
Chapter 4 Configuration Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
[edit security utm] Hierarchy Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
admin-email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
administrator-email (Security Fallback Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
administrator-email (Security Virus Detection) . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
allow-email (Security Fallback Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
allow-email (Security Virus Detection) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
anti-virus (Security Feature Profile) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
application (Security Policies) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
content-size (Security Antivirus Sophos Engine) . . . . . . . . . . . . . . . . . . . . . . . . . . 40
iii Copyright 2012, Juniper Networks, Inc.
content-size-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
custom-message (Security Email Notify) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
custom-message (Security Fallback Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
custom-message (Security Fallback Non-Block) . . . . . . . . . . . . . . . . . . . . . . . . . 42
custom-message (Security Virus Detection) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
custom-message-subject (Security Email Notify) . . . . . . . . . . . . . . . . . . . . . . . . . 43
custom-message-subject (Security Fallback Block) . . . . . . . . . . . . . . . . . . . . . . . 44
custom-message-subject (Security Fallback Non-Block) . . . . . . . . . . . . . . . . . . 44
custom-message-subject (Security Virus Detection) . . . . . . . . . . . . . . . . . . . . . . 45
custom-url-category . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
default (Security Antivirus Sophos Engine) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
display-host (Security Fallback Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
display-host (Security Virus Detection) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
email-notify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
engine-not-ready (Security Antivirus Sophos Engine) . . . . . . . . . . . . . . . . . . . . . . 49
fallback-block (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
fallback-non-block (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
fallback-options (Security Antivirus Sophos Engine) . . . . . . . . . . . . . . . . . . . . . . . 52
feature-profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
filename-extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
from-zone (Security Policies) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
interval (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
juniper-express-engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
mime-pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
mime-whitelist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
no-autoupdate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
no-notify-mail-recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
no-notify-mail-sender (Security Fallback Block) . . . . . . . . . . . . . . . . . . . . . . . . . . 67
no-notify-mail-sender (Security Virus Detection) . . . . . . . . . . . . . . . . . . . . . . . . . 68
no-uri-check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
notification-options (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
notify-mail-recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
notify-mail-sender (Security Fallback Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
notify-mail-sender (Security Virus Detection) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
out-of-resources (Security Antivirus Sophos Engine) . . . . . . . . . . . . . . . . . . . . . . . 71
password (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
pattern-update (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
port (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
profile (Security Sophos Engine Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
protocol-command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
proxy (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
scan-options (Security Antivirus Sophos Engine) . . . . . . . . . . . . . . . . . . . . . . . . . 76
server (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
sophos-engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
sxl-retry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
sxl-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
timeout (Security Antivirus Fallback Options Sophos Engine) . . . . . . . . . . . . . . . 80
timeout (Security Antivirus Scan Options) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
to-zone (Security Policies) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Copyright 2012, Juniper Networks, Inc. iv
UTMSophos Antivirus Protection for Security Devices
too-many-requests (Security Antivirus Fallback Options Sophos Engine) . . . . . 84
trickling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
type (Security Antivirus Feature Profile) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
type (Security Fallback Block) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
type (Security Virus Detection) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
url (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
uri-check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
url-pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
username (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
virus-detection (Security Antivirus) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Part 3 Administration
Chapter 5 Managing Sophos Antivirus Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Managing Sophos Antivirus Data Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Chapter 6 Operational Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
clear security utm antivirus statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
request security utm anti-virus sophos-engine . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
show security utm anti-virus statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
show security utm anti-virus status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Part 4 Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
v Copyright 2012, Juniper Networks, Inc.
Table of Contents
Copyright 2012, Juniper Networks, Inc. vi
UTMSophos Antivirus Protection for Security Devices
List of Tables
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Table 1: Notice Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Table 2: Text and Syntax Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Part 1 Overview
Chapter 1 Supported Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Table 3: UTM Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
vii Copyright 2012, Juniper Networks, Inc.
Copyright 2012, Juniper Networks, Inc. viii
UTMSophos Antivirus Protection for Security Devices
About the Documentation
Documentation and Release Notes on page ix
Supported Platforms on page ix
Using the Examples in This Manual on page x
Documentation Conventions on page xi
Documentation Feedback on page xiii
Requesting Technical Support on page xiii
Documentation and Release Notes
To obtain the most current version of all Juniper Networks

technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
If the information in the latest release notes differs fromthe information in the
documentation, followthe product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books .
Supported Platforms
For the features described in this document, the following platforms are supported:
SRX220
SRX550
SRX110
SRX650
SRX100
SRX240
SRX210
ix Copyright 2012, Juniper Networks, Inc.
Using the Examples in This Manual
If you want to use the examples in this manual, you can use the load merge or the load
merge relative command. These commands cause the software to merge the incoming
configuration into the current candidate configuration. The example does not become
active until you commit the candidate configuration.
If the example configuration contains the top level of the hierarchy (or multiple
hierarchies), the example is a full example. In this case, use the load merge command.
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
Merging a Full Example
To merge a full example, followthese steps:
1. Fromthe HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy thefollowingconfigurationtoafileandnamethefileex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system{
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platformconfiguration by issuing the
load merge configuration mode command:
[edit]
user@host# load merge /var/tmp/ex-script.conf
load complete
Copyright 2012, Juniper Networks, Inc. x
UTMSophos Antivirus Protection for Security Devices
Merging a Snippet
To merge a snippet, followthese steps:
1. Fromthe HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
configuration mode command:
[edit]
user@host# edit systemscripts
[edit systemscripts]
3. Merge the contents of the file into your routing platformconfiguration by issuing the
load merge relative configuration mode command:
[edit systemscripts]
user@host# load merge relative /var/tmp/ex-script-snippet.conf
load complete
For more information about the load command, see the Junos OS CLI User Guide.
Documentation Conventions
Table 1 on page xi defines notice icons used in this guide.
Table 1: Notice Icons
Description Meaning Icon
Indicates important features or instructions. Informational note
Indicates a situation that might result in loss of data or hardware damage. Caution
Alerts you to the risk of personal injury or death. Warning
Alerts you to the risk of personal injury froma laser. Laser warning
Table 2 on page xii defines the text and syntax conventions used in this guide.
xi Copyright 2012, Juniper Networks, Inc.
About the Documentation
Table 2: Text and Syntax Conventions
Examples Description Convention
To enter configuration mode, type
theconfigure command:
user@host> configure
Represents text that you type. Bold text like this
user@host> showchassis alarms
No alarms currently active
Represents output that appears on the
terminal screen.
Fixed-width text like this
A policy termis a named structure
that defines match conditions and
actions.
Junos OSSystemBasics Configuration
Guide
RFC1997, BGPCommunities Attribute
Introduces or emphasizes important
newterms.
Identifies book names.
Identifies RFCand Internet draft titles.
Italic text like this
Configure the machines domain name:
[edit]
root@# set systemdomain-name
domain-name
Represents variables (options for which
you substitute a value) in commands or
configuration statements.
Italic text like this
To configure a stub area, include the
stub statement at the[edit protocols
ospf area area-id] hierarchy level.
Theconsoleport is labeledCONSOLE.
Represents names of configuration
statements, commands, files, and
directories; configurationhierarchy levels;
or labels on routing platform
components.
Text like this
stub <default-metric metric>; Enclose optional keywords or variables. < > (angle brackets)
broadcast | multicast
(string1 | string2 | string3)
Indicates a choice between the mutually
exclusive keywords or variables on either
side of the symbol. The set of choices is
often enclosed in parentheses for clarity.
| (pipe symbol)
rsvp { #Required for dynamic MPLS only Indicates a comment specified on the
samelineas theconfigurationstatement
to which it applies.
# (pound sign)
community name members [
community-ids ]
Enclose a variable for which you can
substitute one or more values.
[ ] (square brackets)
[edit]
routing-options {
static {
route default {
nexthop address;
retain;
}
}
}
Identify a level in the configuration
hierarchy.
Indention and braces ( { } )
Identifies a leaf statement at a
configuration hierarchy level.
; (semicolon)
J-Web GUI Conventions
Copyright 2012, Juniper Networks, Inc. xii
UTMSophos Antivirus Protection for Security Devices
Table 2: Text and Syntax Conventions (continued)
Examples Description Convention
In the Logical Interfaces box, select
All Interfaces.
To cancel the configuration, click
Cancel.
Represents J-Web graphical user
interface (GUI) items you click or select.
Bold text like this
In the configuration editor hierarchy,
select Protocols>Ospf.
Separates levels in a hierarchy of J-Web
selections.
> (bold right angle bracket)
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation. You can send your comments to
techpubs-comments@juniper.net, or fill out the documentation feedback format
https://www.juniper.net/cgi-bin/docbugreport/ . If you are using e-mail, be sure to include
the following information with your comments:
Document or topic name
URL or page number
Software release version (if applicable)
Requesting Technical Support
Technical product support is availablethroughtheJuniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need post-sales technical support, you can access
our tools and resources online or open a case with JTAC.
JTAC policiesFor a complete understanding of our JTAC procedures and policies,
reviewthe JTAC User Guide located at
http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf .
Product warrantiesFor product warranty information, visit
http://www.juniper.net/support/warranty/ .
JTAC hours of operationThe JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
Self-Help Online Tools and Resources
For quick and easy problemresolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
Find CSC offerings: http://www.juniper.net/customers/support/
Search for known bugs: http://www2.juniper.net/kb/
xiii Copyright 2012, Juniper Networks, Inc.
About the Documentation
Find product documentation: http://www.juniper.net/techpubs/
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
Download the latest versions of software and reviewrelease notes:
http://www.juniper.net/customers/csc/software/
Search technical bulletins for relevant hardware and software notifications:
https://www.juniper.net/alerts/
Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/
Toverify serviceentitlement by product serial number, useour Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
Use the Case Management tool in the CSC at http://www.juniper.net/cm/ .
Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
For international or direct-dial options in countries without toll-free numbers, see
http://www.juniper.net/support/requesting-support.html .
Copyright 2012, Juniper Networks, Inc. xiv
UTMSophos Antivirus Protection for Security Devices
PART 1
Overview
Supported Features on page 3
Sophos Antivirus Protection on page 5
1 Copyright 2012, Juniper Networks, Inc.
Copyright 2012, Juniper Networks, Inc. 2
UTMSophos Antivirus Protection for Security Devices
CHAPTER 1
Supported Features
Unified Threat Management on page 3
Unified Threat Management
UnifiedThreat Management (UTM) is atermusedtodescribetheconsolidationof several
security features intoonedevice, protectingagainst multiplethreat types. Theadvantages
of UTMare streamlined installation and management of these multiple security
capabilities.
Table 3 on page 3 lists the UTMfeatures that are supported on SRX Series and J Series
devices.
Table 3: UTMSupport
J Series
SRX1400
SRX3400
SRX3600
SRX5600
SRX5800
SRX550
SRX650
SRX100
SRX110
SRX210
SRX220
SRX240 Feature
Yes No Yes Yes Antispam
Yes No Yes SRX210, SRX220, and
SRX240 only.
Antivirus Express
Yes No Yes Yes Antivirus Full
No No Yes Yes Antivirus Sophos
No No Yes SRX100, SRX210,
SRX220, and SRX240
only
Chassis cluster
(active/active chassis
cluster with the Packet
Forwarding Engine
active on both the
cluster nodes [the
Packet Forwarding
EngineandtheRouting
Engine active in the
same node])
Yes No Yes Yes Content filtering
3 Copyright 2012, Juniper Networks, Inc.
Table 3: UTMSupport (continued)
J Series
SRX1400
SRX3400
SRX3600
SRX5600
SRX5800
SRX550
SRX650
SRX100
SRX110
SRX210
SRX220
SRX240 Feature
No No Yes Yes EnhancedWebfiltering
Yes No Yes Yes Web filtering
Yes No Yes Yes WELF support
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 4
UTMSophos Antivirus Protection for Security Devices
CHAPTER 2
Sophos Antivirus Protection
Sophos Antivirus Protection Overviewon page 5
Sophos Antivirus Features on page 5
Understanding Sophos Antivirus Data File Update on page 6
Comparison of Sophos Antivirus to Kaspersky Antivirus on page 7
Sophos Antivirus Protection Overview
Sophos antivirus scanning is offered as a less CPU-intensive alternative to the full
file-based antivirus feature. Sophos supports the same protocols as full antivirus and
functions in much the same manner; however, it has a smaller memory footprint and is
compatible with lower end devices that have less memory.
Sophos antivirus is as an in-the-cloud antivirus solution. The virus pattern and malware
database is located on external servers maintained by Sophos (Sophos Extensible List)
servers, thus there is no need to download and maintain large pattern databases on the
Juniper device. The Sophos antivirus scanner also uses a local internal cache to maintain
query responses fromthe external list server to improve lookup performance.
Becauseasignificant amount of trafficprocessedby Juniper UnifiedThreat Management
(UTM) is HTTP based, UniformResource Identifier (URI) checking is used to effectively
prevent malicious content fromreaching the endpoint client or server. The following
checks are performed for HTTP traffic: URI lookup, true file type detection, and file
checksumlookup. The following application layer protocols are supported: HTTP, FTP,
SMTP, POP3 and IMAP.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Sophos Antivirus Features on page 5
Sophos Antivirus Configuration Overviewon page 11
Sophos Antivirus Features
Sophos Antivirus has the following main features:
5 Copyright 2012, Juniper Networks, Inc.
Sophos Antivirus ExpandedMIMEDecodingSupportSophos antivirus offers decoding
support for HTTP, POP3, SMTP, and IMAP. MIME decoding support includes the
following for each supported protocol:
Multipart and nested header decoding
Base64decoding, printedquotedecoding, andencodedworddecodinginthesubject
field
SophosAntivirusScanResult HandlingWithSophos antivirus, theTCPtraffic is closed
gracefully when a virus is found and the data content is dropped.
Thefollowingfail modeoptions aresupported: content-size, default, engine-not-ready,
out-of-resource, timeout, and too-many-requests. You can set the following actions:
block, log-and-permit, and permit. Fail mode handling of supported options with
Sophos is much the same as with full antivirus.
Sophos UniformResource Identifier CheckingSophos provides UniformResource
Identifier (URI) checking, which is similar to anti-spamrealtime blackhole list (RBL)
lookups. URI checking is a way of analyzing URI content in HTTP traffic against the
Sophos database to identify malware or malicious content. Because malware is
predominantly static, a checksummechanismis used to identify malware to improve
performance. Files that are capable of using a checksuminclude: .exe, .zip, .rar, .swf,
.pdf, and .ole2 (doc and xls).
NOTE: If you have a Juniper device protecting an internal network that has
no HTTP traffic, or has Web servers that are not accessible to the outside
world, you may want to turn off URI checking. If the Web servers are not
accessible to the outside world, it is unlikely that they contain URI
information that is in the Sophos URI database. URI checking is on by
default.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Sophos Antivirus Protection Overviewon page 5
Sophos Antivirus Configuration Overviewon page 11
Example: Configuring Sophos Antivirus Feature Profile on page 15
Understanding Sophos Antivirus Data File Update
Sophos antivirus uses asmall set of datafiles that needtobeupdatedperiodically. These
data files only contain information on guiding scanning logic and do not contain the full
pattern database. The main pattern database, which includes protection against critical
viruses, URI checks, malware, worms, Trojans, andspyware, is locatedon remote Sophos
Extensible List servers maintained by Sophos.
Copyright 2012, Juniper Networks, Inc. 6
UTMSophos Antivirus Protection for Security Devices
The Sophos data files are updated over HTTP or HTTPS and can be updated manually
or scheduled to update automatically. This is similar functionality to that found in the
Full Antivirus solution, but with some minor differences:
With Sophos antivirus, the signature database auto-update interval is once a day by
default. This interval can be changed.
With Sophos, there is no interruption in virus scanning capability during the data file
update. If the update fails, the existing data files will continue to be used.
By default, the URL for Sophos antivirus data file update is
http://update.juniper-updates.net/SAV/.
NOTE: The Sophos antivirus scanning feature is a separately licensed
subscription service. When your antivirus license key expires, functionality
will nolonger workbecausethepatternlookupdatabaseis locatedonremote
Sophos servers. You have a 30-day grace period in which to update your
license.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Sophos Antivirus Protection Overviewon page 5
Managing Sophos Antivirus Data Files on page 93
Sophos Antivirus Configuration Overviewon page 11
Comparison of Sophos Antivirus to Kaspersky Antivirus
Sophos Antivirus is much like Juniper Express Antivirus and also has similarities to the
Full Antivirus feature:
Unlike the Juniper Express and Full Antivirus solutions, the antivirus and malware
database for Sophos is stored on a group of remote Sophos Extensible List servers.
Queries are performed using the DNS protocol. Sophos maintains these servers, so
there is no need to download and maintain large pattern databases on the Juniper
device. Becausethedatabaseis remote, thereis nosizelimitationandthereis aquicker
response to newvirus outbreaks.
NOTE: Sophos antivirus uses a set of data files that need to be updated
on a regular basis. These are not typical virus pattern files; they are a set
of small files that help guide virus scanning logic. You can manually
download the data files or set up automatic download.
Sophos does not provide the same prescreening detection as Kaspersky Antivirus.
Sophos does provide a similar solution that is part of the Sophos engine and cannot
be turned on and off.
7 Copyright 2012, Juniper Networks, Inc.
Chapter 2: Sophos Antivirus Protection
The Sophos antivirus scanning feature is a separately licensed subscription service.
Also, the pattern lookup database is located on remote servers maintained by Sophos,
so when your antivirus license key expires, functionality will no longer work. You have
a 30-day grace period in which to update your license.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Sophos Antivirus Protection Overviewon page 5
Sophos Antivirus Configuration Overviewon page 11
Copyright 2012, Juniper Networks, Inc. 8
UTMSophos Antivirus Protection for Security Devices
PART 2
Configuration
Sophos Antivirus Protection on page 11
Configuration Statements on page 25
9 Copyright 2012, Juniper Networks, Inc.
Copyright 2012, Juniper Networks, Inc. 10
UTMSophos Antivirus Protection for Security Devices
CHAPTER 3
Sophos Antivirus Protection
Sophos Antivirus Configuration Overviewon page 11
Example: Configuring Sophos Antivirus CustomObjects on page 11
Example: Configuring Sophos Antivirus Feature Profile on page 15
Example: Configuring Sophos Antivirus UTMPolicies on page 21
Example: Configuring Sophos Antivirus Firewall Security Policies on page 22
Sophos Antivirus Configuration Overview
Sophos antivirus is part of the Unified Threat Management (UTM) feature set, so you
first configure UTMoptions (customobjects), configure the Sophos Feature, then create
aUTMpolicy andasecurity policy. Thesecurity policy controls all traffic that is forwarded
by the device, and the UTMpolicy specifies which parameters to use to scan traffic. The
UTMpolicy is also used to bind a set of protocols to one or more UTMfeature profiles,
including Sophos antivirus in this case.
You must complete the following tasks to configure Sophos antivirus:
1. Configure UTMcustomobjects and MIME lists. See Example: Configuring Sophos
Antivirus CustomObjects on page 11,
2. Configure the Sophos antivirus feature profile. See Example: Configuring Sophos
Antivirus Feature Profile on page 15.
3. Configure a UTMpolicy. See Example: Configuring Sophos Antivirus UTMPolicies
on page 21
4. Configure a security policy. See Example: Configuring Sophos Antivirus Firewall
Security Policies on page 22.
Example: Configuring Sophos Antivirus CustomObjects
This example shows you howto create UTMglobal customobjects to be used with
Sophos antivirus.
Requirements on page 12
Overviewon page 12
11 Copyright 2012, Juniper Networks, Inc.
Configuration on page 12
Verification on page 14
Requirements
Before you begin, read about UTMcustomobjects. See Understanding UTMCustom
Objects.
Overview
Configure MIME lists. This includes creating a MIME whitelist and a MIME exception list
for antivirus scanning. In this example, you bypass scanning of QuickTime videos, unless
if they contain the MIME type quicktime-inappropriate.
WARNING: When you configure the MIME whitelist feature, be aware that,
because header information in HTTP traffic can be spoofed, you cannot
always trust HTTP headers to be legitimate. When a Web browser is
determiningtheappropriateactionfor agivenfiletype, it detects thefiletype
without checking the MIME header contents. However, the MIME whitelist
feature does refer to the MIME encoding in the HTTP header. For these
reasons, it is possible in certain cases for a malicious website to provide an
invalid HTTP header. For example, a network administrator might
inadvertently add a malicious website to a MIME whitelist, and, because the
site is in the whitelist, it will not be blocked by Sophos even though Sophos
has identified the site as malicious in its database. Internal hosts would then
be able to reach this site and could become infected.
Configuration
GUI Step-by-Step
Procedure
To configure a MIME list:
1. Click the Configure tab fromthe taskbar, and then select Security>UTM>Custom
Objects.
2. Click the MIME Pattern List tab and then click Add
3. In the MIME Pattern Name box, type avmime2.
4. In the MIME Pattern Value box, type video/quicktime, and click Add.
5. In the MIME Pattern Value box, type image/x-portable-anympa, and click Add.
6. In the MIME Pattern Value box, type x-world/x-vrml, and click Add.
To configure a MIME exception list:
1. Click the Configure tab fromthe taskbar, and then select Security>UTM>Custom
Objects.
2. Click the MIME Pattern List tab and then select Add
3. In the MIME Pattern Name box, type exception-avmime2.
4. In the MIME Pattern Value box, type video/quicktime-inappropriate and click Add.
Copyright 2012, Juniper Networks, Inc. 12
UTMSophos Antivirus Protection for Security Devices
Configure a URL pattern list (whitelist) of URLs or addresses that will be bypassed by
antivirus scanning. After you create the URL pattern list, you will create a customURL
category list and add the pattern list to it.
NOTE: Because you use URL pattern lists to create customURL category
lists, youmust configureURLpatternlist customobjects beforeyouconfigure
customURL category lists.
To configure a URL pattern whitelist:
1. Click the Configure tab fromthe taskbar, and then select Security>UTM>Custom
Objects.
2. Click the URL Pattern List tab, and then click Add
3. In the URL Pattern Name box, enter urlist2.
4. In the URL Pattern Value box, enter http://juniper.net. (You can also us the IP address
of the server instead of the URL.)
Save your configuration:
1. Click OK to check your configuration and save it as a candidate configuration.
2. If you are done configuring the device, click Actions>Commit.
NOTE: URL pattern wildcard supportThe wildcard rule is as follows:
\*\.[]\?* and you must precede all wildcard URLs with http://. You can use
* only if it is at the beginning of the URL and is followed by a .. You can
only use ? at the end of the URL.
The following wildcard syntax is supported: http://*.juniper.net,
http://www.juniper.ne?, http://www.juniper.n??. Thefollowingwildcardsyntax
is not supported: *.juniper.net , www.juniper.ne?, http://*juniper.net, http://*.
Step-by-Step
Procedure
To configure antivirus protection using the CLI, you must create your customobjects in
the following order:
1. Create the MIME whitelist.
[edit security utm]
user@host# set custom-objects mime-pattern avmime2 value [video/quicktime
image/x-portable-anymap x-world/x-vrml]
Create the MIME exception list.
[edit security utm]
user@host# set custom-objects mime-pattern exception-avmime2 value
[video/quicktime-inappropriate]
13 Copyright 2012, Juniper Networks, Inc.
Chapter 3: Sophos Antivirus Protection
2. Configure a URL pattern list (whitelist) of URLs or addresses that you want to
bypass. After you create the URL pattern list, you create a customURL category list
and add the pattern list to it. Configure a URL pattern list customobject by creating
the list name and adding values to it as follows.
NOTE: BecauseyouuseURLpatternliststocreatecustomURLcategory
lists, you must configure URL pattern list customobjects before you
configure customURL category lists.
[edit security utm]
user@host# set custom-objects url-pattern urllist2 value [http://www.juniper.net
192.168.1.5]
NOTE: URL pattern wildcard supportThe wildcard rule is as follows:
\*\.[]\?* and you must precede all wildcard URLs with http://. You can
only use * if it is at the beginning of the URL and is followed by a ..
You can only use ? at the end of the URL.
The following wildcard syntax is supported: http://*.juniper.net,
http://www.juniper.ne?, http://www.juniper.n??. The following wildcard
syntax is not supported: *.juniper.net , www.juniper.ne?,
http://*juniper.net, http://*.
3. Configure a customURL category list customobject by using the URL pattern list
urllist2 that you created earlier:
[edit security utm]
user@host# set custom-objects custom-url-category custurl2 value urllist2
Verification
To verify the configuration, enter the showsecurity utmcustom-objects command.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Sophos Antivirus Protection Overviewon page 5
Sophos Antivirus Configuration Overviewon page 11
Example: Configuring Sophos Antivirus Feature Profile on page 15
Understanding UTMCustomObjects
Copyright 2012, Juniper Networks, Inc. 14
UTMSophos Antivirus Protection for Security Devices
Example: Configuring Sophos Antivirus Feature Profile
This example shows you howto configure a Sophos antivirus profile that defines the
parameters that will be used for virus scanning.
Requirements on page 15
Overviewon page 15
Configuration on page 15
Verification on page 20
Requirements
Before you begin:
Install aSophos antivirus license. SeetheJunos OSInitial ConfigurationGuidefor Security
Devices.
Configurecustomobjects for UTM. SeeExample: ConfiguringSophos Antivirus Custom
Objects on page 11.
Overview
The following configuration defines Sophos as the antivirus engine and sets parameters,
such as the data file update interval, notification options for administrators, fallback
options, and file size limits.
Configuration
GUI Step-by-Step
Procedure
NOTE: The following example shows you howto create a customSophos
profile. If you want to use the Juniper Networks preconfiguredprofile, use the
profile named junos-sophos-av-defaults in your UTMpolicy. See Example:
Configuring Sophos Antivirus UTMPolicies on page 21.
1. Select and configure the engine type. Because you are configuring Sophos antivirus,
you configure sophos-engine:
a. Click the Configure tab fromthe taskbar, and then select
Security>UTM>Anti-Virus.
b. Click the Global Options tab and then click Sophos.
15 Copyright 2012, Juniper Networks, Inc.
Chapter 3: Sophos Antivirus Protection
c. Click OK and commit your changes.
d. Restart the device to enable Sophos as the antivirus engine.
2. Returntothe antivirus Global Options screenas youdidinstep1, andset the following
parameters:
a. In the MIME whitelist list, select exception-avmime2.
b. In the URL whitelist list, select custurl2.
c. In the Pattern update interval (sec) box, type 2880.
d. In the box, type the e-mail address that will receive SophosAdmin email data file
update notifications. For example - admin@juniper.net.
e. In the CustomMessage box, type The Sophos data file update on the SRX240has
beencompleted. IntheCustommessagesubject box, typeSophosDataFileUpdated.
f. Click OK to check your configuration and save it as a candidate configuration.
3. Configure a profile for the sophos-engine and set parameters.
a. ClicktheConfiguretabfromthetaskbar andthenselect Security>UTM>Anti-Virus.
Click Add.
b. In the Add profile box, click the Main tab.
c. In the Profile name box, type sophos-prof1.
d. In the Trickling timeout box, type 180.
WARNING: When enabling the trickling option, its important to
understand that trickling may send part of the file to the client during
the antivirus scan. It is possible that some of the content could be
received by the client and the client may become infected before the
file is fully scanned.
e. URI checking is on by default. To turn it off, clear yes in the URI check box.
f. In the Content size Limit box, type 20000.
g. In the Scan engine timeout box, type 1800.
4. Configure fallback settings by clicking the Fallback settings tab. In this example, all
fallbackoptions areset tologandpermit. ClickLogandpermit for thefollowingitems:
Default action, Content size, Engine not ready, Timeout, Out of resource, Too many
requests.
Copyright 2012, Juniper Networks, Inc. 16
UTMSophos Antivirus Protection for Security Devices
5. Configure notification options by clicking the Notification options tab. You can
configure notifications for both fallback blocking and fallback nonblocking actions
and for virus detection.
To configure notifications for Fallback settings:
a. For Notification type, click Protocol.
b. For Notify mail sender, click yes.
c. In the Custommessage box, type Fallback block action occurred.
d. In the Custommessage subject box, type ***Antivirus fallback Alert***.
6. To configure notification options for virus detection, click the Notification options
cont... tab.
a. For the Notification type option button, select Protocol.
b. For the Notify mail sender option button, select yes.
c. In the Custommessage box, type Virus has been detected.
d. In the Custommessage subject box, type ***Virus detected***.
7. Click OK to check your configuration and save it as a candidate configuration.
8. If you are done configuring the device, click Actions>Commit.
Step-by-Step
Procedure
To configure the Sophos antivirus feature profile using the CLI:
NOTE: The following example shows you howto create a customSophos
profile. If you want to use the Juniper Networks preconfiguredprofile, use the
profile named junos-sophos-av-defaults in your UTMpolicy. See Example:
Configuring Sophos Antivirus UTMPolicies on page 21.
1. Select andconfigure the engine type. Because youare configuringSophos antivirus,
you configure sophos-engine.
[edit]
user@host# set security utmfeature-profile anti-virus type sophos-engine
2. Commit the configuration, and restart the device. After the device restarts, enter
configuration mode again.
3. Select atimeinterval for updatingthedatafiles. Thedefault antivirus pattern-update
interval is 1440 minutes (every 24 hours). You can choose to leave this default, or
you can change it. You can also force a manual update, if needed. To change the
default fromevery 24 hours to every 48 hours:
[edit security utmfeature-profile anti-virus]
user@host# set sophos-engine pattern-update interval 2880
17 Copyright 2012, Juniper Networks, Inc.
Chapter 3: Sophos Antivirus Protection
4. Configure the network device with the proxy server details, to download the pattern
update froma remote server:
[edit security utmfeature-profile anti-virus]
user@host# set sophos-engine pattern-update proxy
5. In most circumstances, you will not need to change the URL to update the pattern
database. If you do need to change this option, use the following command:
[edit security utmfeature-profile anti-virus]
user@host# set sophos-engine pattern-update url
http://www.juniper.net/test-download
6. You can configure the device to notify a specified administrator when data files are
updated. This is ane-mail notificationwithacustommessageandacustomsubject
line.
[edit security utmfeature-profile anti-virus]
user@host# set sophos-engine pattern-update email-notify admin-email
admin@juniper.net custom-message Sophos antivirus data file was updated
custom-message-subject AVdata file updated
7. Configure a list of fallback options as block, log and permit, or permit. The default
setting is log-and-permit. Youcanuse the default settings, or youcanchange them.
Configure the content size action. In this example, if the content size is exceeded,
the action taken is block.
First create the profile named sophos-prof1.
[edit security utmfeature-profile anti-virus]
user@host# edit sophos-engine profile sophos-prof1
Configure the content size fallback-option to block.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set fallback-options content-size block
Configure the default fallback option to log-and-permit.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set fallback-options default log-and-permit
Configure log-and-permit if the antivirus engine is not ready.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set fallback-options engine-not-ready log-and-permit
Configure log-and-permit if the device is out of resources.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set fallback-options out-of-resources log-and-permit
Configure log-and-permit if a virus scan timeout occurs.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set fallback-options timeout log-and-permit
Configure log-and-permit if there are too many requests for the virus engine to
handle.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
Copyright 2012, Juniper Networks, Inc. 18
UTMSophos Antivirus Protection for Security Devices
user@host# set fallback-options too-many-requests log-and-permit
8. Configure notification options. You can configure notifications for fallback blocking,
fallback nonblocking actions, and virus detection.
In this step, configure a custommessage for the fallback blocking action and send
a notification for protocol-only actions to the administrator and the sender.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set notification-options fallback-block custom-message ***Fallback
block action occurred*** custom-message-subject Antivirus Fallback Alert
notify-mail-sender type protocol-only allowemail administrator-email
admin@juniper.net
9. Configure a notification for protocol-only virus detection, and send a notification.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host#set notification-options virus-detection type protocol-only
notify-mail-sender custom-message-subject ***Virus detected***
custom-message Virus has been detected
10. Configure content size parameters.
NOTE: When you configure the content-size value, keep in mind that in
certain cases, content size is available in the protocol headers, so the
max-content-size fallback is applied before a scan request is sent.
However, in many cases, content size is not provided in the protocol
headers. Inthesecases, theTCPpayloadis sent totheantivirus scanner
and accumulates until the end of the payload. If the accumulated
payload exceeds the maximumcontent size value, then
max-content-size fallback is applied. The default fallback action is log
and permit, so you may want to change this option to block, in which
case such a packet is droppedanda block message is sent tothe client.
In this example, if the content size exceeds 20 MB, the packet is dropped.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set scan-options content-size-limit 20000
11. URI checking is on by default. To turn off URI checking:
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set scan-options no-uri-check
12. Configure the timeout setting for the scanning operation to 1800 seconds.
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set scan-options timeout 1800
13. The Sophos Extensible List servers contain the virus and malware database for
scanning operations. Set the response timeout for these servers to 3 seconds (the
default is 2 seconds).
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set scan-options sxl-timeout 3
19 Copyright 2012, Juniper Networks, Inc.
Chapter 3: Sophos Antivirus Protection
14. Configure the Sophos Extensible List server retry option to 2 retries (the default is
1).
[edit security utmfeature-profile anti-virus sophos-engine profile sophos-prof1]
user@host# set scan-options sxl-retry 2
15. Configure the trickling setting to 180 seconds. If you use trickling, you can also set
timeout parameters. Trickling applies only to HTTP. HTTP trickling is a mechanism
used to prevent the HTTP client or server fromtiming out during a file transfer or
during antivirus scanning.
WARNING: When you enable the trickling option, keep in mind that
trickling might send part of a file to the client during its antivirus scan.
It is therefore possible that some of the content could be received by
the client before the file has been fully scanned.
[edit security utmfeature-profile anti-virus]
user@host#set sophos-engine profile sophos-prof1 trickling timeout 180
16. Configure the antivirus module to use MIME bypass lists and exception lists. You
can use your own customobject lists, or you can use the default list that ships with
thedevicecalledjunos-default-bypass-mime. Inthis example, youusethelists that
you setup earlier.
[edit security utmfeature-profile anti-virus]
user@host# set mime-whitelist list avmime2
[edit security utmfeature-profile anti-virus]
user@host# set mime-whitelist list exception-avmime2
17. Configure the antivirus module to use URL bypass lists. If you are using a URL
whitelist, this is a customURL category you have previously configured as a custom
object. URL whitelists are valid only for HTTP traffic. In this example you use the
lists that you setup earlier.
[edit security utmfeature-profile anti-virus]
user@host#set url-whitelist custurl2
Verification
To verify your feature profile configuration, run the showsecurity utmfeature-profile
anti-virus command.
Obtaining Information About the Current Antivirus Status
Action Fromoperational mode, enter the showsecurity utmanti-virus status command to view
the antivirus status.
user@host>showsecurity utmanti-virus status
Meaning Antivirus key expire dateThe license key expiration date.
Update serverURL for the data file update server.
Copyright 2012, Juniper Networks, Inc. 20
UTMSophos Antivirus Protection for Security Devices
IntervalThe time period, in minutes, when the device will update the data file from
the update server.
PatternupdatestatusWhenthedatafilewill beupdatednext, displayedinminutes.
Last resultResult of the last update. If you already have the latest version, this will
display already have latest database.
Antivirus signature versionVersion of the current data file.
Scan engine typeThe antivirus engine type that is currently running.
Scan engine informationResult of the last action that occurred with the current scan
engine.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Sophos Antivirus Protection Overviewon page 5
Sophos Antivirus Configuration Overviewon page 11
Example: Configuring Sophos Antivirus UTMPolicies
This example shows howto create a UTMpolicy for Sophos antivirus.
Requirements on page 21
Overviewon page 21
Configuration on page 22
Verification on page 22
Requirements
Before you create the UTMpolicy, create customobjects and the Sophos feature profile.
1. Configure UTMcustomobjects and MIME lists. See Example: Configuring Sophos
Antivirus CustomObjects on page 11.
2. Configure the Sophos antivirus feature profile. See Example: Configuring Sophos
Antivirus Feature Profile on page 15.
Overview
After you have created an antivirus feature profile, you configure a UTMpolicy for an
antivirus scanning protocol and attach this policy to a feature profile. In this example,
HTTP will be scanned for viruses, as indicated by the http-profile statement. You can
scan other protocols as well by creating different profiles or adding other protocols to
the profile, such as: imap-profile, pop3-profile, and smtp-profile.
21 Copyright 2012, Juniper Networks, Inc.
Chapter 3: Sophos Antivirus Protection
Configuration
GUI Step-by-Step
Procedure
To configure a UTMpolicy for Sophos antivirus:
1. Click the Configure tab fromthe taskbar, and then select Security>Policy>UTM
Policies. Then click Add.
2. Click the Main tab. In the Policy name box, type utmp3.
3. Click the Anti-Virus profiles tab. In the HTTP profile list, select sophos-prof1.
4. Click OK to check your configuration and save it as a candidate configuration.
5. If you are done configuring the device, select Actions>Commit.
Step-by-Step
Procedure
To configure a UTMpolicy for Sophos antivirus:
Go to the edit security utmhierarchy. 1.
[edit]
user@host# edit security utm
2. Create the UTMpolicy utmp3 and attach it to the http-profile sophos-prof1.
[edit security utm]
user@host# set utm-policy utmp3 anti-virus http-profile sophos-prof1
NOTE: You can use the default Sophos feature profile settings by
replacing sophos-prof1 in the above statement with
junos-sophos-av-defaults.
Verification
To verify the configuration, enter the showsecurity utmutm-policy utmp3 command.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Sophos Antivirus Protection Overviewon page 5
Sophos Antivirus Configuration Overviewon page 11
Example: Configuring Sophos Antivirus Feature Profile on page 15
Example: Configuring Sophos Antivirus Firewall Security Policies
This example shows howto create a security policy for Sophos antivirus.
Requirements on page 23
Overviewon page 23
Configuration on page 23
Verification on page 24
Copyright 2012, Juniper Networks, Inc. 22
UTMSophos Antivirus Protection for Security Devices
Requirements
Before you create the security policy, create customobjects, the Sophos feature profile,
and the UTMpolicy.
1. Configure UTMcustomobjects and MIME lists. See Example: Configuring Sophos
Antivirus CustomObjects on page 11.
2. Configure the Sophos antivirus feature profile. See Example: Configuring Sophos
Antivirus Feature Profile on page 15.
3. Configure a UTMpolicy. See Example: Configuring Sophos Antivirus UTMPolicies
on page 21.
Overview
Create a firewall security policy that will cause traffic fromthe untrust zone to the trust
zone to be scanned by Sophos antivirus using the feature profile settings defined in
Example: Configuring Sophos Antivirus Feature Profile on page 15. Because the match
application configuration is set to any, all application types will be scanned.
Configuration
GUI Step-by-Step
Procedure
To configure a security policy for Sophos antivirus:
Configure the untrust to trust policy to match any source address or destination
address, and select the applications to be scanned to any.
a. Click the Configure tab fromthe taskbar, and then select Security>Policy>FW
Policies. Then select Add.
1.
b. In the Policy Name box, type p3
c. In the Policy Action box, select permit.
d. In the FromZone list, select untrust.
e. In the To Zone list, select trust.
f. In the Source Address and Destination Address boxes, make sure that Matched is
set to any.
g. In the Applications boxes, select any fromthe Application/Sets list, and move it
to the Matched list.
2. Attach the UTMpolicy named utmp3 to the firewall security policy. This will cause
matched traffic to be scanned by the Sophos antivirus feature.
a. Fromthe Edit Policy box, click the Application Services tab.
b. In the UTMPolicy list, select utmp3.
3. Click OK to check your configuration and save it as a candidate configuration.
4. If you are done configuring the device, select Actions>Commit.
23 Copyright 2012, Juniper Networks, Inc.
Chapter 3: Sophos Antivirus Protection
Step-by-Step
Procedure
To configure a security policy for Sophos antivirus:
Configure the untrust to trust policy to match any source-address. 1.
[edit security]
user@host# set policies from-zone untrust to-zone trust policy p3 match
source-address any
2. Configure the untrust to trust policy to match any destination-address.
[edit security]
user@host# set policies from-zone untrust to-zone trust policy p3 match
destination-address any
3. Configure the untrust to trust policy to match any application type.
[edit security]
user@host#set policiesfrom-zoneuntrust to-zonetrust policyp3matchapplication
any
4. Attach the UTMpolicy named utmp3 to the firewall security policy. This will cause
matched traffic to be scanned by the Sophos antivirus feature.
[edit security]
user@host# set policies from-zone untrust to-zone trust policy p3 then permit
application-services utm-policy utmp3
Verification
To verify the configuration, enter the showsecurity policies command.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Sophos Antivirus Protection Overviewon page 5
Sophos Antivirus Configuration Overviewon page 11
Example: Configuring Sophos Antivirus Feature Profile on page 15
Copyright 2012, Juniper Networks, Inc. 24
UTMSophos Antivirus Protection for Security Devices
CHAPTER 4
Configuration Statements
[edit security utm] Hierarchy Level on page 25
[edit security utm] Hierarchy Level
security {
utm{
application-proxy {
traceoptions {
flag flag;
}
}
custom-objects {
custom-url-category object-name {
value [value];
}
filename-extension object-name {
value [value];
}
mime-pattern object-name {
value [value];
}
protocol-command object-name {
value [value];
}
url-pattern object-name {
value [value];
}
}
feature-profile {
anti-spam{
address-blacklist list-name;
address-whitelist list-name;
sbl {
profile profile-name {
custom-tag-string [string];
(no-sbl-default-server | sbl-default-server);
spam-action (block | tag-header | tag-subject);
}
}
traceoptions {
flag flag;
25 Copyright 2012, Juniper Networks, Inc.
}
}
anti-virus {
juniper-express-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile profile-name {
fallback-options {
content-size (block | log-and-permit);
default (block | log-and-permit);
engine-not-ready (block | log-and-permit);
out-of-resources (block | (log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
(intelligent-prescreening | no-intelligent-prescreening);
timeout value;
}
Copyright 2012, Juniper Networks, Inc. 26
UTMSophos Antivirus Protection for Security Devices
trickling {
timeout value;
}
}
}
kaspersky-lab-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile profile-name {
fallback-options {
content-size (block | log-and-permit);
corrupt-file (block | log-and-permit);
decompress-layer (block | log-and-permit);
default (block | log-and-permit);
engine-not-ready (block | log-and-permit);
out-of-resources (block | (log-and-permit);
password-file (block | (log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
27 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
scan-options {
content-size-limit value;
decompress-layer-limit value;
(intelligent-prescreening | no-intelligent-prescreening);
scan-extension filename;
scan-mode (all | by-extension);
timeout value;
}
trickling {
timeout value;
}
}
}
mime-whitelist {
exception listname;
list listname {
exception listname;
}
}
sophos-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile <name> {
fallback-options {
content-size (block | log-and-permit | permit);
default (block | log-and-permit | permit);
engine-not-ready (block | log-and-permit | permit);
out-of-resources (block | log-and-permit | permit);
timeout (block | log-and-permit | permit);
too-many-requests (block | log-and-permit | permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
Copyright 2012, Juniper Networks, Inc. 28
UTMSophos Antivirus Protection for Security Devices
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
(no-uri-check | uri-check);
timeout value;
}
trickling {
timeout value;
}
}
sxl-retry value;
sxl-timeout seconds;
}
traceoptions {
flag flag;
}
type (juniper-express-engine | kaspersky-lab-engine | sophos-engine);
url-whitelist listname;
}
content-filtering {
profile profile-name {
block-command protocol-command-list;
block-content-type (activex | exe | http-cookie | java-applet | zip);
block-extension extension-list;
block-mime {
exception list-name;
list list-name;
}
notification-options {
custom-message message;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
permit-command protocol-command-list;
}
traceoptions {
flag flag;
}
}
web-filtering {
juniper-enhanced {
cache {
size value;
timeout value;
}
profile profile-name {
29 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
block-message {
type {
custom-redirect-url;
}
url url;
}
category customurl-list name {
action (block | log-and-permit | permit);
}
custom-block-message value;
default (block | log-and-permit | permit);
fallback-settings {
default (block | log-and-permit);
server-connectivity (block | log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
no-safe-search;
site-reputation-action {
fairly-safe (block | log-and-permit | permit);
harmful (block | log-and-permit | permit);
moderately-safe (block | log-and-permit | permit);
suspicious (block | log-and-permit | permit);
very-safe (block | log-and-permit | permit);
}
timeout value;
}
server {
host host-name;
port number;
}
}
juniper-local {
profile profile-name {
custom-block-message value;
default (block | log-and-permit | permit);
fallback-settings {
default (block | log-and-permit);
server-connectivity (block | log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
timeout value;
}
}
surf-control-integrated {
cache {
size value;
timeout value;
}
profile profile-name {
category customurl-list name {
action (block | log-and-permit | permit);
}
custom-block-message value;
default (block | log-and-permit | permit);
Copyright 2012, Juniper Networks, Inc. 30
UTMSophos Antivirus Protection for Security Devices
fallback-settings {
default (block | log-and-permit);
server-connectivity (block | log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
timeout value;
}
server {
host host-name;
port number;
}
}
traceoptions {
flag flag;
}
type (juniper-enhanced | juniper-local | surf-control-integrated |
websense-redirect);
url-blacklist listname;
url-whitelist listname;
websense-redirect {
profile profile-name {
account value;
custom-block-message value;
fallback-settings {
default (block | log-and-permit);
server-connectivity (block | log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
server {
host host-name;
port number;
}
sockets value;
timeout value;
}
}
}
}
ipc {
traceoptions {
flag flag;
}
}
traceoptions {
flag flag;
}
utm-policy policy-name {
anti-spam{
smtp-profile profile-name;
}
anti-virus {
ftp {
download-profile profile-name;
upload-profile profile-name;
31 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
}
http-profile profile-name;
imap-profile profile-name;
pop3-profile profile-name;
smtp-profile profile-name;
}
content-filtering {
ftp {
download-profile profile-name;
upload-profile profile-name;
}
http-profile profile-name;
imap-profile profile-name;
pop3-profile profile-name;
smtp-profile profile-name;
}
traffic-options {
sessions-per-client {
limit value;
over-limit (block | log-and-permit);
}
}
web-filtering {
http-profile profile-name;
}
}
}
}
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
admin-email
Syntax admin-email email-address;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update
email-notify]
[edit securityutmfeature-profileanti-viruskaspersky-lab-enginepattern-updateemail-notify]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update email-notify]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description You can configure the device to notify a specified administrator when patterns are
updated. This is an email notification with a custommessage and a customsubject line.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 32
UTMSophos Antivirus Protection for Security Devices
administrator-email (Security Fallback Block)
Syntax administrator-email email-address;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Configure the administrator e-mail address that will be notified when a fallback-block
occurs. This is an e-mail notification with a custommessage and a customsubject line.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
administrator-email (Security Virus Detection)
Syntax administrator-email email address;
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine profile profile name
notification-options virus-detection]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Configure the administrator e-mail address that will be notified when a virus is detected
by Sophos antivirus. This is an e-mail notification with a custommessage and a custom
subject line.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
33 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
allow-email (Security Fallback Block)
Syntax allow-email;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Enable e-mail notification to notify a specified administrator when a fallback-block
occurs.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
allow-email (Security Virus Detection)
Syntax allowemail;
Hierarchy Level [edit security utmfeature-profile anti-virus profile notification-options virus-detect]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Enable e-mail notification to notify a specified administrator when a virus is detected.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 34
UTMSophos Antivirus Protection for Security Devices
anti-virus (Security Feature Profile)
Syntax anti-virus {
juniper-express-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile profile-name {
fallback-options {
content-size (block | log-and-permit);
default (block | log-and-permit);
engine-not-ready (block | log-and-permit);
out-of-resources (block | (log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
(intelligent-prescreening | no-intelligent-prescreening);
35 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
timeout value;
}
trickling {
timeout value;
}
}
}
kaspersky-lab-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile profile-name {
fallback-options {
content-size (block | log-and-permit);
corrupt-file (block | log-and-permit);
decompress-layer (block | log-and-permit);
default (block | log-and-permit);
engine-not-ready (block | log-and-permit);
out-of-resources (block | (log-and-permit);
password-file (block | (log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
Copyright 2012, Juniper Networks, Inc. 36
UTMSophos Antivirus Protection for Security Devices
}
}
scan-options {
content-size-limit value;
decompress-layer-limit value;
(intelligent-prescreening | no-intelligent-prescreening);
scan-extension filename;
scan-mode (all | by-extension);
timeout value;
}
trickling {
timeout value;
}
}
}
mime-whitelist {
exception listname;
list listname {
exception listname;
}
}
sophos-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile <name> {
fallback-options {
content-size (block | log-and-permit | permit);
default (block | log-and-permit | permit);
engine-not-ready (block | log-and-permit | permit);
out-of-resources (block | log-and-permit | permit);
timeout (block | log-and-permit | permit);
too-many-requests (block | log-and-permit | permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
37 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
(no-uri-check | uri-check);
timeout value;
}
trickling {
timeout value;
}
}
sxl-retry value;
sxl-timeout seconds;
}
traceoptions flag flag;
type (juniper-express-engine | kaspersky-lab-engine | sophos-engine);
url-whitelist listname;
}
Hierarchy Level [edit security utmfeature-profile]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description Configure UTMantivirus full and express features.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 38
UTMSophos Antivirus Protection for Security Devices
application (Security Policies)
Syntax application {
[application];
any;
}
Hierarchy Level [edit security policies from-zone zone-name to-zone zone-name policy policy-name match]
Release Information Statement introduced in Release 8.5 of Junos OS.
Description Specify the IP or remote procedure call (RPC) application or set of applications to be
used as match criteria.
Options application-name-or-setName of the application or application set used as match
criteria.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
39 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
content-size (Security Antivirus Sophos Engine)
Syntax content-size (block | log-and-permit | permit);
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine profile profile-name
fallback-options]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description If the content size exceeds a set limit, the content is either passed or blocked.
NOTE: Whenyouconfigurethecontent-sizevalue, keepinmindthat incertain
cases, content size is available in the protocol headers, so the
max-content-size fallback is applied before a scan request is sent. However,
in many cases, content size is not provided in the protocol headers. In these
cases, theTCPpayloadis sent totheantivirus scanner andaccumulates until
the end of the payload. If the accumulated payload exceeds the maximum
content sizevalue, thenmax-content-sizefallbackisapplied. Youmight want
to set the fallback action to block, in which case such a packet is dropped
and a block message is sent to the client.
Options blockLog the error and deny the traffic
log-and-permitLog the error and permit the traffic
permitPermit the traffic
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 40
UTMSophos Antivirus Protection for Security Devices
content-size-limit
Syntax content-size-limit value;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
scan-options]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
scan-options]
[edit securityutmfeature-profileanti-virussophos-engineprofileprofile-namescan-options]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description The content size check occurs before the scan request is sent. The content size refers to
accumulated TCP payload size.
Range: 20 through 20,000
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
custom-message (Security Email Notify)
Syntax custom-message message;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update
email-notify]
[edit securityutmfeature-profileanti-viruskaspersky-lab-enginepattern-updateemail-notify]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update email-notify]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description You can configure the device to notify a specified administrator when patterns are
updated. This is an email notification with a custommessage.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
41 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
custom-message (Security Fallback Block)
Syntax custom-message message;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Custommessage notifications are mainly used in file replacement or in a response
message when the antivirus scan result is to drop the file.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
custom-message (Security Fallback Non-Block)
Syntax custom-message message;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-non-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-non-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-non-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Custommessage notifications are mainly used in file replacement or in a response
message when the antivirus scan result is to drop the file.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 42
UTMSophos Antivirus Protection for Security Devices
custom-message (Security Virus Detection)
Syntax custom-message message;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options virus-detection]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Custommessage notifications are mainly used in file replacement or in a response
message when the antivirus scan result is to drop the file.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
custom-message-subject (Security Email Notify)
Syntax custom-message-subject message-subject;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update
email-notify]
[edit securityutmfeature-profileanti-viruskaspersky-lab-enginepattern-updateemail-notify]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update email-notify]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description You can configure the device to notify a specified administrator when patterns are
updated. This is an email notification with a custommessage and a customsubject line.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
43 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
custom-message-subject (Security Fallback Block)
Syntax custom-message-subject message-subject;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Custommessage notifications are mainly used in file replacement or in a response
message when the antivirus scan result is to drop the file. As part of a custommessage,
you can customize the message subject line.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
custom-message-subject (Security Fallback Non-Block)
Syntax custom-message-subject message-subject;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-non-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-non-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-non-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Custommessage notifications are mainly used in file replacement or in a response
message when the antivirus scan result is to drop the file. As part of a custommessage,
you can customize the message subject line.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 44
UTMSophos Antivirus Protection for Security Devices
custom-message-subject (Security Virus Detection)
Syntax custom-message-subject message-subject;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options virus-detection]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Custommessage notifications are mainly used in file replacement or in a response
message when the antivirus scan result is to drop the file. As part of a custommessage,
you can customize the message subject line.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
45 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
custom-url-category
Syntax custom-url-category object-name {
value [value];
}
Hierarchy Level [edit security utmcustom-objects]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description Use URL pattern lists to create CustomURL category lists. These are lists of patterns
that bypass scanning.
WARNING: Customcategory does not take precedence over pre-defined
categories when it has the same name as one of the pre-defined categories.
It is recommended not to have a customcategory name be the same as the
predefined category name.
Options object-nameName of the URL category-list object.
value valueValue of the URL category-list object. You can configure multiple values
separated by spaces and enclosed in square brackets.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 46
UTMSophos Antivirus Protection for Security Devices
default (Security Antivirus Sophos Engine)
Syntax default (block | log-and-permit | permit);
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine profile profile-name
fallback-options]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description All errors other than those specifically listed fall into this category. This could include
either unhandled systemexceptions (internal errors) or other unknown errors.
Options blockLog the error and deny the traffic
log-and-permitLog the error and permit the traffic
permitPermit the traffic
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
display-host (Security Fallback Block)
Syntax display-host;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Display thecomputer host nameinthenotificatione-mail sent totheadministrator when
a fallback-block notification occurs.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
47 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
display-host (Security Virus Detection)
Syntax display-host;
Hierarchy Level [edit security utmfeature-profile anti-virus profile profile name notification-options
virus-detection]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Display thecomputer host nameinthenotificatione-mail sent totheadministrator when
a virus is detected by Sophos antivirus.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
email-notify
Syntax email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
Hierarchy Level [edit security utmfeature-profile anti-virus kaspersky-lab-engine pattern-update]
[edit security utmfeature-profile anti-virus juniper-express-engine pattern-update]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description You can configure the device to notify a specified administrator when patterns are
updated. This is an e-mail notification with a custommessage anda customsubject line.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 48
UTMSophos Antivirus Protection for Security Devices
engine-not-ready (Security Antivirus Sophos Engine)
Syntax default (block | log-and-permit | permit);
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine profile profile-name
fallback-options]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description The scan engine is initializing itself, for example, loading the signature database. During
this phase, it is not ready to scan a file. A file could either pass or be blocked according
to this setting.
Options blockLog the error and deny the traffic
log-and-permitLog the error and permit the traffic
permitPermit the traffic
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
49 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
fallback-block (Security Antivirus)
Syntax fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Configure notifications for fallback blocking actions. Fallback options tell the system
howto handle the errors returned by either the scan engine or the scan manager.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 50
UTMSophos Antivirus Protection for Security Devices
fallback-non-block (Security Antivirus)
Syntax fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Configure notifications for fallback nonblocking actions.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
51 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
fallback-options (Security Antivirus Sophos Engine)
Syntax fallback-options {
content-size (block | log-and-permit | permit);
default (block | log-and-permit | permit);
engine-not-ready (block | log-and-permit | permit);
out-of-resources (block | log-and-permit | permit);
timeout (block | log-and-permit | permit);
too-many-requests (block | log-and-permit | permit);
}
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine profile profile-name]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Configure fallback options to instruct the systemhowto handle errors.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 52
UTMSophos Antivirus Protection for Security Devices
feature-profile
Syntax feature-profile {
anti-spam{
address-blacklist list-name;
address-whitelist list-name;
sbl {
profile profile-name {
custom-tag-string [string];
no-sbl-default-server;
sbl-default-server;
spam-action (block | tag-header | tag-subject);
}
}
traceoptions flag flag-name;
}
anti-virus {
juniper-express-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile profile-name {
fallback-options {
content-size (block | log-and-permit);
default (block | log-and-permit);
engine-not-ready (block | log-and-permit);
out-of-resources (block | (log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
53 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
(intelligent-prescreening | no-intelligent-prescreening);
timeout value;
}
trickling {
timeout value;
}
}
}
kaspersky-lab-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile profile-name {
fallback-options {
content-size (block | log-and-permit);
corrupt-file (block | log-and-permit);
decompress-layer (block | log-and-permit);
default (block | log-and-permit);
engine-not-ready (block | log-and-permit);
out-of-resources (block | (log-and-permit);
password-file (block | (log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
Copyright 2012, Juniper Networks, Inc. 54
UTMSophos Antivirus Protection for Security Devices
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
decompress-layer-limit value;
(intelligent-prescreening | no-intelligent-prescreening);
scan-extension filename;
scan-mode (all | by-extension);
timeout value;
}
trickling {
timeout value;
}
}
}
mime-whitelist {
exception listname;
list listname {
exception listname;
}
}
sophos-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile <name> {
fallback-options {
content-size (block | log-and-permit | permit);
default (block | log-and-permit | permit);
55 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
engine-not-ready (block | log-and-permit | permit);
out-of-resources (block | log-and-permit | permit);
timeout (block | log-and-permit | permit);
too-many-requests (block | log-and-permit | permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
(no-uri-check | uri-check);
timeout value;
}
trickling {
timeout value;
}
}
sxl-retry value;
sxl-timeout seconds;
}
traceoptions flag flag;
type (juniper-express-engine | kaspersky-lab-engine | sophos-engine);
url-whitelist listname;
}
content-filtering {
profile profile-name {
block-command protocol-command-list;
block-content-type (activex | exe | http-cookie | java-applet | zip);
block-extension extension-list;
block-mime {
exception list-name;
list list-name;
}
notification-options {
custom-message message;
no-notify-mail-sender;
notify-mail-sender;
Copyright 2012, Juniper Networks, Inc. 56
UTMSophos Antivirus Protection for Security Devices
type (message | protocol-only);
}
permit-command protocol-command-list;
}
traceoptions flag flag-name;
}
web-filtering {
juniper-enhanced {
cache {
size value;
timeout value;
}
profile profile-name {
category customurl-list name {
action (block | log-and-permit | permit);
}
custom-block-message value;
default (block | log-and-permit | permit);
fallback-settings {
default (block | log-and-permit);
server-connectivity (block | log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
no-safe-search;
site-reputation-action {
fairly-safe (block | log-and-permit | permit);
harmful (block | log-and-permit | permit);
moderately-safe (block | log-and-permit | permit);
suspicious (block | log-and-permit | permit);
very-safe (block | log-and-permit | permit);
}
timeout value;
}
server {
host host-name;
port number;
}
}
juniper-local {
profile profile-name {
custom-block-message value;
default (block | log-and-permit | permit);
fallback-settings {
default (block | log-and-permit);
server-connectivity (block | log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
timeout value;
}
}
surf-control-integrated {
cache {
size value;
timeout value;
57 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
}
profile profile-name {
category customurl-list name {
action (block | log-and-permit | permit);
}
custom-block-message value;
default (block | log-and-permit | permit);
fallback-settings {
default (block | log-and-permit);
server-connectivity (block | log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
timeout value;
}
server {
host host-name;
port number;
}
}
traceoptions flag flag-name;
type (juniper-enhanced | juniper-local | surf-control-integrated | websense-redirect);
url-blacklist listname;
url-whitelist listname;
websense-redirect {
profile profile-name {
account value;
custom-block-message value;
fallback-settings {
default (block | log-and-permit);
server-connectivity (block | log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
server {
host host-name;
port number;
}
sockets value;
timeout value;
}
}
}
}
Hierarchy Level [edit security utm]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description Configure UTMfeatures, antivirus, antispam, content-filtering, and web-filtering by
creating feature profiles.
Options The remaining statements are explained separately.
Copyright 2012, Juniper Networks, Inc. 58
UTMSophos Antivirus Protection for Security Devices
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
filename-extension
Syntax filename-extension object-name {
value [value];
}
Hierarchy Level [edit security utmcustom-objects]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description When scanning content, you can use a file extension list to define a set of file extensions
that are used in file extension scan mode (scan-by-extension).
Options object-nameName of the extension-list object.
value valueValue of the extension-list object. You can configure multiple values
separated by spaces and enclosed in square brackets.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
59 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
from-zone (Security Policies)
Syntax from-zone zone-name to-zone zone-name {
policy policy-name {
description description;
match {
application {
[application];
any;
}
destination-address {
[address];
any;
any-ipv4;
any-ipv6;
}
source-address {
[address];
any;
any-ipv4;
any-ipv6;
}
source-identity {
[role-name];
any;
authenticated-user;
unauthenticated-user;
unknown-user;
}
}
scheduler-name scheduler-name;
then {
count {
alarm{
per-minute-threshold number;
per-second-threshold number;
}
}
deny;
log {
session-close;
session-init;
}
permit {
application-services {
application-firewall {
rule-set rule-set-name;
}
application-traffic-control {
rule-set rule-set-name;
}
gprs-gtp-profile profile-name;
gprs-sctp-profile profile-name;
idp;
Copyright 2012, Juniper Networks, Inc. 60
UTMSophos Antivirus Protection for Security Devices
redirect-wx | reverse-redirect-wx;
ssl-proxy {
profile-name profile-name;
}
uac-policy {
captive-portal captive-portal;
}
utm-policy policy-name;
}
destination-address {
drop-translated;
drop-untranslated;
}
firewall-authentication {
pass-through {
access-profile profile-name;
client-match user-or-group-name;
web-redirect;
}
web-authentication {
client-match user-or-group-name;
}
}
services-offload;
tcp-options {
sequence-check-required;
syn-check-required;
}
tunnel {
ipsec-group-vpn group-vpn;
ipsec-vpn vpn-name;
pair-policy pair-policy;
}
}
reject;
}
}
}
Hierarchy Level [edit security policies]
Release Information Statement introduced in Release 8.5 of Junos OS. The services-offload option added in
Release 11.4 of Junos OS. Statement updated with source-identity option in Release 12.1
of Junos OS. The description option added in Release 12.1 of Junos OS.
Description Specify a source zone and destination zone to be associated with the security policy.
Options zone-name Name of the source zone.
to-zone zone-nameName of the destination zone.
The remaining statements are explained separately.
61 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
interval (Security Antivirus)
Syntax interval value;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine pattern-update]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update]
Release Information Statement introducedinRelease9.5of Junos OSfor Juniper Express engineandKaspersky
Lab engine. Support for Sophos engine added in Release 11.1 of Junos OS.
Description Set the pattern data files auto-update interval. You can choose to leave the default
interval value or you can change it by using this command. You can also force a manual
update, if necessary.
NOTE: The data files used with Sophos are not a typical virus pattern files,
they are small file that helps guide virus scanning logic. The full virus pattern
databaseis storedonanexternal Sophos server calledtheSophos Extensible
List (SXL) server.
Options valuePattern data files auto-update interval in minutes.
Range: 10 through 10,080 minutes (10 minutes through 7 days)
Default: For Juniper Express engine and Kaspersky Lab engine, 60 minutes; for Sophos
engine, 1440 minutes (every 24 hours)
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Copyright 2012, Juniper Networks, Inc. 62
UTMSophos Antivirus Protection for Security Devices
juniper-express-engine
Syntax juniper-express-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile profile-name {
fallback-options {
content-size (block | log-and-permit);
default (block | log-and-permit);
engine-not-ready (block | log-and-permit);
out-of-resources (block | (log-and-permit);
timeout (block | log-and-permit);
too-many-requests (block | log-and-permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
(intelligent-prescreening | no-intelligent-prescreening);
timeout value;
63 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
}
trickling {
timeout value;
}
}
}
Hierarchy Level [edit security utmfeature-profile anti-virus]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description Configure the UTMexpress antivirus feature.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
mime-pattern
Syntax mime-pattern object-name {
value [value];
}
Hierarchy Level [edit security utmcustom-objects]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description The gateway device uses MIME (Multipurpose Internet Mail Extension) types to decide
which traffic may bypass various types of scanning.
Options object-nameName of the MIME object.
value valueValue of the MIME object. You can configure multiple values separated
by spaces and enclosed in square brackets.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 64
UTMSophos Antivirus Protection for Security Devices
mime-whitelist
Syntax mime-whitelist {
exception listname;
list listname {
exception listname;
}
}
Hierarchy Level [edit security utmfeature-profile anti-virus]
Release Information Statement introduced in Release 9.5 of Junos OS. Statement updated in 11.1 for Sophos
antivirus support.
Description Configure the antivirus scanner to use MIME bypass lists and exception lists. You can use
your own customobject lists, or you can use the default list that ships with the device
called junos-default-bypass-mime.
WARNING: When you configure the MIME whitelist feature, be aware that,
because header information in HTTP traffic can be spoofed, you cannot
always trust HTTP headers to be legitimate. When a Web browser is
determiningtheappropriateactionfor agivenfiletype, it detects thefiletype
without checking the MIME header contents. However, the MIME whitelist
feature does refer to the MIME encoding in the HTTP header. For these
reasons, it is possible in certain cases for a malicious website to provide an
invalid HTTP header. For example, a network administrator might
inadvertently add a malicious website to a MIME whitelist, and, because the
site is in the whitelist, it will not be blocked by Sophos even though Sophos
has identified the site as malicious in its database. Internal hosts would then
be able to reach this site and could become infected.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
65 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
no-autoupdate
Syntax no-autoupdate;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine pattern-update]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update]
Release Information Statement introducedinRelease9.5of Junos OSfor Juniper Express engineandKaspersky
Lab engine. Support for Sophos engine added in Release 11.1 of Junos OS.
Description Turn off automatic data file (pattern file) update for the Kaspersky Lab, Juniper Express,
or Sophos engines.
NOTE: The data files used with Sophos are not a typical virus pattern files,
they are small file that helps guide virus scanning logic. The full virus pattern
databaseis storedonanexternal Sophos server calledtheSophos Extensible
List (SXL) server.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 66
UTMSophos Antivirus Protection for Security Devices
no-notify-mail-recipient
Syntax no-notify-mail-recipient;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-non-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-non-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-non-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Donot notify thee-mail recipient about errors returnedby theantivirus scanenginewhen
a fallback-non-block action occurs.
You can specify that the e-mail recipient is to be notified with the notify-mail-recipient
statement.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
no-notify-mail-sender (Security Fallback Block)
Syntax no-notify-mail-sender;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Do not notify the e-mail sender about errors returned by the antivirus scan engine when
a fallback action occurs.
You can specify that the e-mail sender is to be notified with the notify-mail-sender
statement.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
67 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
no-notify-mail-sender (Security Virus Detection)
Syntax no-notify-mail-sender;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options virus-detection]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Do not notify the e-mail sender when a virus is detected by the antivirus engine.
You can specify that the e-mail sender is to be notified with the notify-mail-sender
statement.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
no-uri-check
Syntax no-uri-check;
Hierarchy Level [edit securityutmfeature-profileanti-virussophos-engineprofileprofile-namescan-options]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Donot performSophos antivirus UniformResourceIdentifier (URI) checking. URI checking
is performed by analyzing HTTP traffic URI content against a remote Sophos database
server to identify malware or malicious content. URI checking is on by default.
You can enable Sophos antivirus URI checking with the uri-check statement.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 68
UTMSophos Antivirus Protection for Security Devices
notification-options (Security Antivirus)
Syntax notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description There are multiple notification options you can configure to trigger when a virus is
detected.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
69 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
notify-mail-recipient
Syntax notify-mail-recipient;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-non-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-non-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-non-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Notify the e-mail recipient about errors returned by the antivirus scan engine when a
fallback-non-block action occurs.
You can specify that the e-mail recipient is not to be notified with the
no-notify-mail-recipient statement.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
notify-mail-sender (Security Fallback Block)
Syntax notify-mail-sender;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description E-mail notification is used to notify the sender or the recipient about the errors returned
by either the scan engine or the scan manager when a fallback action occurs.
You can specify that the sender is not to be notified with the no-notify-mail-sender
statement.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 70
UTMSophos Antivirus Protection for Security Devices
notify-mail-sender (Security Virus Detection)
Syntax notify-mail-sender;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options virus-detection]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description E-mail notificationis usedtonotify the sender or the recipient about the detectedviruses
or the scanning errors. Whenavirus is detected, ane-mail is sent tothe sender uponvirus
detection.
You can specify that the sender is not to be notified with the no-notify-mail-sender
statement.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
out-of-resources (Security Antivirus Sophos Engine)
Syntax default (block | log-and-permit | permit);
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine profile profile-name
fallback-options]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Virus scanning requires a great deal of memory and CPU resources. Due to resource
constraints, memory allocation requests can be denied by the system. When
out-of-resources occurs, scanning is aborted.
Options blockLog the error and deny the traffic
log-and-permitLog the error and permit the traffic
permitPermit the traffic
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
71 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
password (Security Antivirus)
Syntax password password-string;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update proxy]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine pattern-update proxy]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update proxy]
Release Information Statement introduced in Release 11.2 of Junos OS.
Description Set the password for the proxy server.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
pattern-update (Security Antivirus)
Syntax pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine]
[edit security utmfeature-profile anti-virus sophos-engine]
Release Information Statement introducedinRelease9.5of Junos OSfor Juniper Express engineandKaspersky
Lab engine. Support for Sophos engine added in Release 11.1 of Junos OS.
Description Updates to the pattern file are added as newviruses are discovered. You can configure
the security device to regularly update the pattern file automatically, or you can update
the file manually.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Copyright 2012, Juniper Networks, Inc. 72
UTMSophos Antivirus Protection for Security Devices
port (Security Antivirus)
Syntax port port-number;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update proxy]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine pattern-update proxy]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update proxy]
Release Information Statement introduced in Release 11.2 of Junos OS.
Description Set the port number for the proxy server.
Options Range: 0 through 65,535
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
73 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
profile (Security Sophos Engine Antivirus)
Syntax profile <name> {
fallback-options {
content-size (block | log-and-permit | permit);
default (block | log-and-permit | permit);
engine-not-ready (block | log-and-permit | permit);
out-of-resources (block | log-and-permit | permit);
timeout (block | log-and-permit | permit);
too-many-requests (block | log-and-permit | permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
(no-uri-check | uri-check);
timeout value;
}
trickling {
timeout value;
}
}
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Create a profile for the Sophos antivirus engine. This profile includes all subsequent
configuration options.
Options The remaining statements are explained separately.
Copyright 2012, Juniper Networks, Inc. 74
UTMSophos Antivirus Protection for Security Devices
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
protocol-command
Syntax protocol-command object-name {
value [value];
}
Hierarchy Level [edit security utmcustom-objects]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description Different protocols usedifferent commands tocommunicatebetweenservers andclients.
By blocking or allowing certain commands, traffic can be controlled on the protocol
command level.
Options object-nameName of the command-list object.
value valueValue of the command-list object. You can configure multiple values
separated by spaces and enclosed in square brackets.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
75 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
proxy (Security Antivirus)
Syntax proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine pattern-update]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update]
Release Information Statement introduced in Release 11.2 of Junos OS.
Description Update the pattern file on the proxy server.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
scan-options (Security Antivirus Sophos Engine)
Syntax scan-options {
content-size-limit value;
(no-uri-check | uri-check);
timeout value;
}
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine profile profile-name]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Configure the antivirus feature to scan specific types of traffic based on various scanning
configuration parameters.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 76
UTMSophos Antivirus Protection for Security Devices
server (Security Antivirus)
Syntax server address-or-url;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update proxy]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine pattern-update proxy]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update proxy]
Release Information Statement introduced in Release 11.2 of Junos OS.
Description Set the IP address or URL for the proxy server.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
77 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
sophos-engine
Syntax sophos-engine {
pattern-update {
email-notify {
admin-email email-address;
custom-message message;
custom-message-subject message-subject;
}
interval value;
no-autoupdate;
proxy {
password password-string;
port port-number;
server address-or-url;
username name;
}
url url;
}
profile <name> {
fallback-options {
content-size (block | log-and-permit | permit);
default (block | log-and-permit | permit);
engine-not-ready (block | log-and-permit | permit);
out-of-resources (block | log-and-permit | permit);
timeout (block | log-and-permit | permit);
too-many-requests (block | log-and-permit | permit);
}
notification-options {
fallback-block {
administrator-email email-address;
allow-email;
custom-message message;
custom-message-subject message-subject;
display-host;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
fallback-non-block {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-recipient | notify-mail-recipient);
}
virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
}
scan-options {
content-size-limit value;
(no-uri-check | uri-check);
timeout value;
Copyright 2012, Juniper Networks, Inc. 78
UTMSophos Antivirus Protection for Security Devices
}
trickling {
timeout value;
}
}
sxl-retry value;
sxl-timeout seconds;
}
Hierarchy Level [edit security utmfeature-profile anti-virus]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Configure the UTMSophos antivirus feature.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
sxl-retry
Syntax sxl-retry value;
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Configure the number of retry attempts to the remote Sophos Extensible List (SXL)
server when a request timeout occurs.
Options value Number of retries.
Range: 0 through 5
Default: 1
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
79 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
sxl-timeout
Syntax sxl-timeout seconds;
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Configure the timeout value for responses to a Sophos checksumor URI query.
Options seconds Number of seconds before timeout occurs.
Range: 1 through 5 seconds
Default: 2 seconds
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
timeout (Security Antivirus Fallback Options Sophos Engine)
Syntax default (block | log-and-permit | permit);
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine profile profile-name
fallback-options]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description Scanning a complex file couldconsume resources andtime. If the time it is taking to scan
exceeds the timeout setting in the antivirus profile, the processing is aborted and the
content is either passed or blocked without completing the virus checking. The decision
is made based on the timeout fallback option.
Options blockLog the error and deny the traffic
log-and-permitLog the error and permit the traffic
permitPermit the traffic
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 80
UTMSophos Antivirus Protection for Security Devices
timeout (Security Antivirus Scan Options)
Syntax timeout value;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
scan-options]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
scan-options]
[edit securityutmfeature-profileanti-virussophos-engineprofileprofile-namescan-options]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description The scanning timeout value includes the time frame fromwhen the scan request is
generated to when the scan result is returned by the scan engine. The time range can be
1 to 1800 seconds. By default, it is 180 seconds.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
81 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
to-zone (Security Policies)
Syntax to-zone zone-name {
policy policy-name {
description description;
match {
application {
[application];
any;
}
destination-address {
[address];
any;
any-ipv4;
any-ipv6;
}
source-address {
[address];
any;
any-ipv4;
any-ipv6;
}
source-identity {
[role-name];
any;
authenticated-user;
unauthenticated-user;
unknown-user;
}
}
scheduler-name scheduler-name;
then {
count {
alarm{
per-minute-threshold number;
per-second-threshold number;
}
}
deny;
log {
session-close;
session-init;
}
permit {
application-services {
application-firewall {
rule-set rule-set-name;
}
application-traffic-control {
rule-set rule-set-name;
}
gprs-gtp-profile profile-name;
gprs-sctp-profile profile-name;
idp;
Copyright 2012, Juniper Networks, Inc. 82
UTMSophos Antivirus Protection for Security Devices
redirect-wx | reverse-redirect-wx;
ssl-proxy {
profile-name profile-name;
}
uac-policy {
captive-portal captive-portal;
}
utm-policy policy-name;
}
destination-address {
drop-translated;
drop-untranslated;
}
firewall-authentication {
pass-through {
access-profile profile-name;
client-match user-or-group-name;
web-redirect;
}
web-authentication {
client-match user-or-group-name;
}
}
services-offload;
tcp-options {
sequence-check-required;
syn-check-required;
}
tunnel {
ipsec-group-vpn group-vpn;
ipsec-vpn vpn-name;
pair-policy pair-policy;
}
}
reject;
}
}
}
Hierarchy Level [edit security policies from-zone zone-name]
Release Information Statement introduced in Release 8.5 of Junos OS. The services-offload and junos-host
options addedinRelease11.4of Junos OS. Statement updatedwithsource-identity option
in Release 12.1 of Junos OS.
Description Specify a destination zone to be associated with the security policy.
Options zone-nameName of the destination zone object.
junos-hostDefault security zone for self-traffic of the device.
The remaining statements are explained separately.
83 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
too-many-requests (Security Antivirus Fallback Options Sophos Engine)
Syntax default (block | log-and-permit | permit);
Hierarchy Level [edit security utmfeature-profile anti-virus sophos-engine profile profile-name
fallback-options]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description If the total number of messages received concurrently exceeds the device limits, the
content is either passed or blocked depending on the too-many-request fallback option.
(The allowed request limit is not configurable.)
Options blockLog the error and deny the traffic
log-and-permitLog the error and permit the traffic
permitPermit the traffic
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 84
UTMSophos Antivirus Protection for Security Devices
trickling
Syntax trickling {
timeout value;
}
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name]
Release Information Statement introduced in Release 9.5 of Junos OS. Statement updated in Release 11.1 of
Junos OS for Sophos support.
Description HTTPtrickling is a mechanismused to prevent the HTTPclient or server fromtiming-out
during a file transfer or during antivirus scanning. HTTPTrickling is time-based and there
is only oneparameter toconfigurefor this feature, whichis thetimeout Interval. By default,
trickling is disabled.
WARNING: When you enable the trickling option, keep in mind that trickling
might send part of a file to the client during its antivirus scan. It is therefore
possible that some of the content could be received by the client before the
file has been fully scanned.
Options valueTimeout interval in seconds.
Range: 0 through 600 seconds
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
85 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
type (Security Antivirus Feature Profile)
Syntax type (juniper-express-engine | kaspersky-lab-engine | sophos-engine);
Hierarchy Level [edit security utmfeature-profile anti-virus]
Release Information Statement introduced in Release 9.5 of Junos OS. Statement updated for Sophos in
Release 11.1 of Junos OS.
Description Set the antivirus engine that will be used on the device. You can only have one engine
type running and you must restart the device if you change engines.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
type (Security Fallback Block)
Syntax type (message | protocol-only);
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options fallback-block]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options fallback-block]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description You can configure notifications for both fallback blocking and fallback nonblocking
actions. With protocol-only notifications, a protocol-specific error code may be returned
to the client.
Options messageSend a generic notification.
protocol-onlySend a protocol-specific notification.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 86
UTMSophos Antivirus Protection for Security Devices
type (Security Virus Detection)
Syntax type (message | protocol-only);
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options virus-detection]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options virus-detection]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Whencontent is blockedbecauseavirus is foundor ascanerror occurs, theclient generally
still receives a successful response code but with modified content (file replacement)
containing a warning message. But with protocol-only notifications, a protocol-specific
error code may be returned to the client.
Options messageSend a generic notification.
protocol-onlySend a protocol-specific notification.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
url (Security Antivirus)
Syntax url url;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine pattern-update]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update]
Release Information Statement introducedinRelease9.5of Junos OSfor Juniper Express engineandKaspersky
Lab engine. Support for Sophos engine added in Release 11.1 of Junos OS.
Description Specify the URL for the pattern database. You should not change the default URL unless
you are experiencing problems with it and have called for support.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
87 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
uri-check
Syntax uri-check;
Hierarchy Level [edit securityutmfeature-profileanti-virussophos-engineprofileprofile-namescan-options]
Release Information Statement introduced in Release 11.1 of Junos OS.
Description PerformSophos antivirus UniformResource Identifier (URI) checking. URI checking is a
way of analyzing URI content in HTTP traffic against a remote Sophos database to
identify malware or malicious content. URI checking is on by default.
You can disable Sophos antivirus URI checking with the no-uri-check statement.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
url-pattern
Syntax url-pattern object-name {
value [value];
}
Hierarchy Level [edit security utmcustom-objects]
Release Information Statement introduced in Release 9.5 of Junos OS.
Description Use URL pattern lists to create customURL category lists. These are lists of patterns
that bypass scanning.
WARNING: Customcategory does not take precedence over pre-defined
categories when it has the same name as one of the pre-defined categories.
It is recommended not to have a customcategory name be the same as the
predefined category name.
Options object-nameName of the URL list object.
value valueValue of the URL list object. You can configure multiple values separated
by spaces and enclosed in square brackets.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
Copyright 2012, Juniper Networks, Inc. 88
UTMSophos Antivirus Protection for Security Devices
username (Security Antivirus)
Syntax username name;
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine pattern-update proxy]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine pattern-update proxy]
[edit security utmfeature-profile anti-virus sophos-engine pattern-update proxy]
Release Information Statement introduced in Release 11.2 of Junos OS.
Description Set the username for the proxy server.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
virus-detection (Security Antivirus)
Syntax virus-detection {
custom-message message;
custom-message-subject message-subject;
(no-notify-mail-sender | notify-mail-sender);
type (message | protocol-only);
}
Hierarchy Level [edit security utmfeature-profile anti-virus juniper-express-engine profile profile-name
notification-options]
[edit security utmfeature-profile anti-virus kaspersky-lab-engine profile profile-name
notification-options]
[edit security utmfeature-profile anti-virus sophos-engine profile profile-name
notification-options]
Release Information Statement introduced in Release 9.5 of Junos OS. Support for Sophos engine added in
Release 11.1 of Junos OS.
Description Configure a notification to send when a virus is detected.
Options The remaining statements are explained separately.
Required Privilege
Level
securityTo viewthis statement in the configuration.
security-controlTo add this statement to the configuration.
Related
Documentation
Junos OS Security Configuration Guide
89 Copyright 2012, Juniper Networks, Inc.
Chapter 4: Configuration Statements
Copyright 2012, Juniper Networks, Inc. 90
UTMSophos Antivirus Protection for Security Devices
PART 3
Administration
Managing Sophos Antivirus Protection on page 93
Operational Commands on page 95
91 Copyright 2012, Juniper Networks, Inc.
Copyright 2012, Juniper Networks, Inc. 92
UTMSophos Antivirus Protection for Security Devices
CHAPTER 5
Managing Sophos Antivirus Protection
Managing Sophos Antivirus Data Files on page 93
Managing Sophos Antivirus Data Files
Before you begin:
Install aSophos antivirus license. SeetheJunos OSInitial ConfigurationGuidefor Security
Devices.
Configure Sophos as the antivirus feature for the device. See Example: Configuring
Sophos Antivirus Feature Profile on page 15. To set the antivirus engine type, you run
the set security utmfeature-profile anti-virus type sophos-engine statement.
In this example, you configure the security device to update the data files automatically
every 4320 minutes (every 3 days). The default data file update interval is 1440 minutes
(every 24 hours).
To automatically update Sophos data files:
[edit security utmfeature-profile anti-virus]
user@host# set sophos-engine pattern-update interval 4320
NOTE: The following commands are performed fromCLI operational mode.
To manually update data files:
user@host> request security utmanti-virus sophos-engine pattern-update
To manually reload data files:
user@host> request security utmanti-virus sophos-engine pattern-reload
To manually delete data files:
user@host> request security utmanti-virus sophos-engine pattern-delete
To check the status of antivirus, which also shows the data files version:
user@host> showsecurity utmanti-virus status
To check the status of the proxy server:
93 Copyright 2012, Juniper Networks, Inc.
user@host> showsecurity utmanti-virus status
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Sophos Antivirus Protection Overviewon page 5
Understanding Sophos Antivirus Data File Update on page 6
Sophos Antivirus Configuration Overviewon page 11
Copyright 2012, Juniper Networks, Inc. 94
UTMSophos Antivirus Protection for Security Devices
CHAPTER 6
Operational Commands
95 Copyright 2012, Juniper Networks, Inc.
clear security utmantivirus statistics
Syntax clear security utmanti-virus statistics
Release Information Command introduced in Release 9.5 of Junos OS. Support for Sophos Antivirus added
in Release 11.1 of Junos OS.
Support for UTMin chassis cluster added in Release 11.4 of Junos OS.
Description Clear antivirus statistics information. With chassis cluster support for UTM, statistics
fromboth the nodes is cleared.
Required Privilege
Level
clear
Related
Documentation
showsecurity utmanti-virus statistics on page 98
showsecurity utmanti-virus status on page 100
request security utmanti-virus juniper-express-engine
request security utmanti-virus kaspersky-lab-engine
Output Fields This command produces no output.
Sample Output
clear security utm
antivirus statistics
user@host> clear security utmanti-virus statistics
Copyright 2012, Juniper Networks, Inc. 96
UTMSophos Antivirus Protection for Security Devices
request security utmanti-virus sophos-engine
Syntax request security utmanti-virus sophos-engine
Release Information Command introduced in Release 11.1 of Junos OS.
Support for UTMin chassis cluster added in Release 11.4 of Junos OS.
Description Manually update the Sophos antivirus pattern database using the command described.
You can update the express antivirus pattern database automatically or manually. To
updateautomatically youusetheconfigurationstatement set securityutmfeature-profile
anti-virussophos-enginepattern-updateinterval seconds. Withfull chassis cluster support
for UTMthis command is operational on both the nodes.
Options pattern-delete Delete the current Sophos antivirus pattern database.
pattern-reload Reload the Sophos antivirus pattern database.
pattern-update Update the Sophos antivirus pattern database with the latest
signatures.
Required Privilege
Level
maintenance
Related
Documentation
clear security utmantivirus statistics on page 96
showsecurity utmanti-virus statistics on page 98
showsecurity utmanti-virus status on page 100
List of Sample Output request security utmanti-virus sophos-engine pattern-update on page 97
Output Fields request security utmanti-virus sophos-engine pattern-update
When you enter this command, you are provided feedback on the status of your request.
Sample Output
request security utm
anti-virus
user@host> request security utmanti-virus sophos-engine pattern-update
sophos-engine
pattern-update
97 Copyright 2012, Juniper Networks, Inc.
Chapter 6: Operational Commands
showsecurity utmanti-virus statistics
Syntax showsecurity utmanti-virus statistics
Release Information Command introduced in Release 9.5 of Junos OS. Support for Sophos Antivirus added
in Release 11.1 of Junos OS.
Support for UTMin chassis cluster added in Release 11.4 of Junos OS.
Description Display antivirus statistics for connections including clean and infected files and scan
engine status. Statistics fromboth the nodes (with full chassis cluster support for UTM)
is displayed.
Required Privilege
Level
view
Related
Documentation
clear security utmantivirus statistics on page 96
showsecurity utmanti-virus status on page 100
request security utmanti-virus juniper-express-engine
request security utmanti-virus kaspersky-lab-engine
Output Fields showsecurity utmanti-virus statistics
Output fields are listed in the approximate order in which they appear.
showsecurity utmanti-virus statistics
user@host>showsecurity utmanti-virus statistics
Intelligent-prescreening passed: 0
MIME-whitelist passed: 0
URL-whitelist passed: 0
Forwarded to scan engine: 0
Scan Mode:
scan-all: 0
Scan-extension: 0
Scan Code:
clear: 0
Infected: 0
Password files 0
Decompress layers: 0
Corrupt files: 0
Out of resources: 0
Internal errors: 0
Fall back: log-and-permit block
Engine not ready: 0 0
Password file: 0 0
Decompress layer: 0 0
Corrupt files: 0 0
Out of resources: 0 0
Timeout: 0 0
Maximum content size: 0 0
Copyright 2012, Juniper Networks, Inc. 98
UTMSophos Antivirus Protection for Security Devices
Too many requests: 0 0
Others: 0 0
99 Copyright 2012, Juniper Networks, Inc.
Chapter 6: Operational Commands
showsecurity utmanti-virus status
Syntax showsecurity utmanti-virus status
Release Information Command introduced in Release 9.5 of Junos OS.
Support for UTMin chassis cluster added in Release 11.4 of Junos OS.
Description Displayantivirus status for connections includingcleanandinfectedfiles andscanengine
status. Status of both the nodes (with full chassis cluster support for UTM) is displayed.
Required Privilege
Level
view
Related
Documentation
clear security utmantivirus statistics on page 96
showsecurity utmanti-virus statistics on page 98
request security utmanti-virus juniper-express-engine
request security utmanti-virus kaspersky-lab-engine
Output Fields showsecurity utmanti-virus status
Output fields are listed in the approximate order in which they appear.
showsecurity utmanti-virus status
user@host> showsecurity utmanti-virus status
Anti-virus key expire date: 2010-07-30
Update server: http://update.juniper-updates.net/EAV/SRX210/
Interval: 1440 minutes
Pattern update status: next update in 922 minutes
Last result: download catalog file failed
Anti-virus signature version: 000000_00
Anti-virus signature compiler version: N/A
Scan engine type: juniper-express-engine
Scan engine information: Engine not ready
Pattern type: N/A
Total number of signatures: 11020
New signatures (13):
------------------------
00021301 Backdoor.Win32.Frauder.ky
00021296 Rootkit.Win32.Pakes.e
00021323 Trojan-Downloader.Win32.Exchanger.agf
00021303 Trojan-Downloader.Win32.Injecter.arc
00021325 Trojan-PSW.Win32.LdPinch.abgp
00021299 Trojan-Ransom.Win32.Hexzone.pr
00021298 Trojan-Spy.Win32.Zbot.fgt
00021300 Trojan-Spy.Win32.Zbot.fgv
00021324 Trojan-Spy.Win32.Zbot.fgw
00021322 Trojan-Spy.Win32.Zbot.fhc
00021321 Trojan-Spy.Win32.Zbot.fhd
00021297 Trojan.Win32.FraudPack.aju
00021302 Trojan.Win32.Inject.isz
Modified signatures (0):
------------------------
Copyright 2012, Juniper Networks, Inc. 100
UTMSophos Antivirus Protection for Security Devices
Removed signatures (1):
------------------------
00020871 Trojan-GameThief.Win32.OnLineGames.bjpk
101 Copyright 2012, Juniper Networks, Inc.
Chapter 6: Operational Commands
Copyright 2012, Juniper Networks, Inc. 102
UTMSophos Antivirus Protection for Security Devices
PART 4
Index
Index on page 105
103 Copyright 2012, Juniper Networks, Inc.
Copyright 2012, Juniper Networks, Inc. 104
UTMSophos Antivirus Protection for Security Devices
Index
Symbols
#, comments in configuration statements....................xii
( ), in syntax descriptions......................................................xii
< >, in syntax descriptions....................................................xii
[ ], in configuration statements..........................................xii
{ }, in configuration statements.........................................xii
| (pipe), in syntax descriptions...........................................xii
A
admin-email statement.......................................................32
administrator-email...............................................................33
administrator-email statement
(Security Fallback Block)............................................33
allow-email (virus-detect).................................................34
allow-email statement
(Security Fallback Block)...........................................34
anti-virus statement
(Security Feature Profile)...........................................35
antivirus
sophos overview...............................................................5
antivirus, Sophos
custom objects.................................................................11
feature profile...................................................................15
managing antivirus data files....................................93
security policies...............................................................22
updating antivirus data files.........................................6
utm policies.......................................................................21
application statement
(Security Policies).........................................................39
B
braces, in configuration statements.................................xii
brackets
angle, in syntax descriptions.......................................xii
square, in configuration statements........................xii
C
clear security utm antivirus statistics.............................96
comments, in configuration statements........................xii
content-size statement
(Security Antivirus Sophos Engine).......................40
content-size-limit statement..............................................41
conventions
text and syntax..................................................................xi
curly braces, in configuration statements......................xii
custom-message statement
(Security Email Notify).................................................41
(Security Fallback Block)............................................42
(Security Fallback Non-Block).................................42
(Security Virus Detection)..........................................43
custom-message-subject (email-notify)
statement..............................................................................43
custom-message-subject statement
(Security Fallback Block)...........................................44
(Security Fallback Non-Block).................................44
(Security Virus Detection)..........................................45
custom-url-category.............................................................46
customer support...................................................................xiii
contacting JTAC..............................................................xiii
D
default statement
(Security Antivirus Sophos Engine)........................47
display-host (virus-detection)..........................................48
display-host statement
(Security Fallback Block)............................................47
documentation
comments on..................................................................xiii
E
email-notify statement........................................................48
engine-not-ready statement
(Security Antivirus Sophos Engine)........................49
F
fallback-block statement
(Security Antivirus).......................................................50
fallback-non-block statement
(Security Antivirus)........................................................51
fallback-options statement
(Security Antivirus Sophos Engine)........................52
feature-profile..........................................................................53
filename-extension................................................................59
font conventions.......................................................................xi
from-zone statement
(Security Policies).........................................................60
I
interval statement
(Security Antivirus).......................................................62
105 Copyright 2012, Juniper Networks, Inc.
J
juniper-express-engine statement..................................63
M
manuals
comments on..................................................................xiii
mime-pattern..........................................................................64
mime-whitelist statement..................................................65
N
no-autoupdate statement..................................................66
no-notify-mail-recipient statement................................67
no-notify-mail-sender statement
(Security Fallback Block)............................................67
(Security Virus Detection)..........................................68
no-uri-check statement.......................................................68
notification-options statement
(Security Antivirus).......................................................69
notify-mail-recipient statement.......................................70
notify-mail-sender statement
(Security Fallback Block)............................................70
O
out-of-resources statement
(Security Antivirus Sophos Engine).........................71
P
parentheses, in syntax descriptions.................................xii
password statement
(Security Antivirus)........................................................72
pattern-update statement
(Security Antivirus)........................................................72
port statement
(Security Antivirus)........................................................73
profile statement
(Security Sophos Engine Antivirus)........................74
protocol-command................................................................75
proxy statement
(Security Antivirus)........................................................76
R
request security utm anti-virus sophos-engine..........97
S
scan-options statement
(Security Antivirus Sophos Engine)........................76
server statement
(Security Antivirus)........................................................77
show security utm anti-virus statistics..........................98
show security utm anti-virus status..............................100
Sophos antivirus
configuration overview...................................................11
custom objects.................................................................11
feature profile...................................................................15
overview...............................................................................5
security policies...............................................................22
utm policies.......................................................................21
Sophos Antivirus
features.................................................................................5
sophos-engine statement...................................................78
sophots Antivirus
comparison to kaspersky...............................................7
support, technical See technical support
sxl-retry statement.................................................................79
sxl-timeout statement.........................................................80
syntax conventions..................................................................xi
T
technical support
contacting JTAC..............................................................xiii
timeout statement
(Security Antivirus Fallback Options Sophos
Engine)..........................................................................80
(Security Antivirus Scan Options)...........................81
to-zone statement
(Security Policies).........................................................82
too-many-requests statement
(Security Antivirus Fallback Options Sophos
Engine)..........................................................................84
trickling statement.................................................................85
type
(Security Virus Detection)..........................................87
type statement
(Security Antivirus Feature Profile)........................86
(Security Fallback Block)...........................................86
U
Unified Threat Management.................................................3
sophos antivirus overview.............................................5
support table......................................................................3
uri-check statement..............................................................88
url statement
(Security Antivirus).......................................................87
url-pattern.................................................................................88
username statement
(Security Antivirus).......................................................89
UTMSee Unified Threat Management
Copyright 2012, Juniper Networks, Inc. 106
UTMSophos Antivirus Protection for Security Devices
V
virus-detection statement
(Security Antivirus).......................................................89
107 Copyright 2012, Juniper Networks, Inc.
Index
Copyright 2012, Juniper Networks, Inc. 108
UTMSophos Antivirus Protection for Security Devices

Das könnte Ihnen auch gefallen