Example: Attaching Express Antivirus UTM Policies to Security Policies (CLI)

After you create a UTM policy, create a security policy and attach the UTM policy to the security policy:

  1. Enable and configure the security policy. The following example enables the p2 security policy:

    user@host# set security policies from-zone trust to-zone untrust policy p3 match source-address anyuser@host# set security policies from-zone trust to-zone untrust policy p3 match destination-address anyuser@host# set security policies from-zone trust to-zone untrust policy p3 match application junos-http
  2. Attach the UTM policy to the security policy. The following example attaches the utmp3 UTM policy to the p3 security policy:

    user@host# set security policies from-zone trust to-zone untrust policy p3 then permit application-services utm-policy utmp3

Related Topics

JUNOS Software Feature Support Reference for SRX Series and J Series Devices