Example: Attaching Integrated Web Filtering UTM Policies to Security Policies (CLI)

To attach a UTM policy to a security policy:

  1. Create and configure the security policy. The following example creates the p5 security policy:

    user@host# set security policies from-zone trust to-zone untrust policy p5 match source-address anyuser@host# set security policies from-zone trust to-zone untrust policy p5 match destination-address anyuser@host# set security policies from-zone trust to-zone untrust policy p5 match application junos-http
  2. Attach the UTM policy to the security policy. The following example attaches the utmp5 UTM policy to the p5 security policy:

    user@host# set security policies from-zone trust to-zone untrust policy p5 then permit application-services utm-policy utmp5

Related Topics

JUNOS Software Feature Support Reference for SRX Series and J Series Devices