Example: Attaching Full Antivirus UTM Policies to Security Policies (CLI)
After you create a UTM policy, create a security policy and attach the UTM policy to the security policy:
Enable and configure the security policy. The following example enables the p2 security policy:
user@host# set security policies from-zone trust to-zone untrust policy p2 match source-address anyuser@host# set security policies from-zone trust to-zone untrust policy p2 match destination-address anyuser@host# set security policies from-zone trust to-zone untrust policy p2 match application junos-httpAttach the UTM policy to the security policy. The following example attaches the utmp2 UTM policy to the p2 security policy:
user@host# set security policies from-zone trust to-zone untrust policy p2 then permit application-services utm-policy utmp2
Related Topics
JUNOS Software Feature Support Reference for SRX Series and J Series Devices