Configuring Server-Based Spam Filtering (J-Web Procedure)
To configure server-based antispam:
- Select Configure>Security>UTM>Anti-Spam.
- In the Anti-Spam profiles configuration window, click Add to configure a profile for the SBL server or Edit to modify an existing item.
- In the Profile name box, enter a unique name for the antispam profile that you are creating.
- If you are using the default server, select Yes next to Default SBL server. If you are not using
the default server, select No.
Note: The SBL server is predefined on the device. It ships knowing the name and address of the SBL server. If you do not select Yes, you are disabling server-based spam filtering. You should only disable it if you are using only local lists or if you do not have a license for server-based spam filtering.
- In the Custom tag string box, enter a custom string for identifying a message as spam. By default, the devices uses ***SPAM***.
- From the antispam action list, select the action that the device should take when it detects spam. Options include Tag subject, Block email, or Tag header.
- Click OK to save your profile.
- If the profile is saved successfully, you receive a confirmation and you must click OK again. If the profile is not saved successfully, you can click Details in the pop-up window that appears to discover why.
Next, configure a UTM policy for SMTP. You will attach the antispam profile to this UTM policy:
- Select Configure>Security>Policy>UTM Policies.
- In the UTM policy configuration window, click Add.
- In the policy configuration window, select the Main tab.
- In the Policy name box, enter a unique name for the UTM policy.
- In the Session per client limit box, enter a session per client limit. Valid values range from 0 to 20000.
- From the Session per client over limit list, select the action that the device should take when the session per client limit for this UTM policy is exceeded. Options include Log and permit and Block.
- Select the Anti-Spam profiles tab in the pop-up window.
- From the SMTP profile list, select an antispam profile to attach to this UTM policy.
- Click OK to save your policy.
- If the policy is saved successfully, you receive a confirmation and you must click OK again. If the profile is not saved successfully, you can click Details in the pop-up window that appears to discover why.
Next, attach the UTM policy to a security policy:
- Select Configure>Security>Policy>FW Policies.
- In the Security Policy window, click Add to configure a security policy with UTM or Edit to modify an existing policy.
- In the Policy tab, enter a name in the Policy Name box.
- Next to From Zone, select a zone from the list.
- Next to To Zone, select a zone from the list.
- Choose a Source Address.
- Choose a Destination Address.
- Choose an application by selecting junos-smtp (for antispam) in the Application Sets box and clicking the —> button to move it to the Matched box.
- Next to Policy Action, select one of the following: Permit, Deny, or Reject.
Note: When you select Permit for Policy Action, several additional fields become available in the Applications Services tab, including UTM Policy.
- Select the Application Services tab.
- Next to UTM Policy, select the appropriate policy from the list. This attaches your UTM policy to the security policy.
- Click OK to save your policy.
- If the policy is saved successfully, you receive
a confirmation and you must click OK again. If
the profile is not saved successfully, you can click Details in the pop-up window that appears to discover why.
Note: You must activate your new policy to apply it.
Related Topics
JUNOS Software Feature Support Reference for SRX Series and J Series Devices