Example: Attaching Local Web Filtering UTM Policies to Security Policies (CLI)
To attach a UTM policy to a security policy:
Create and configure the security policy. The following example creates the p5 security policy:
user@host# set security policies from-zone trust to-zone untrust policy p5 match source-address anyuser@host# set security policies from-zone trust to-zone untrust policy p5 match destination-address anyuser@host# set security policies from-zone trust to-zone untrust policy p5 match application junos-httpAttach the UTM policy to the security policy. The following example attaches the utmp5 UTM policy to the p5 security policy:
user@host# set security policies from-zone trust to-zone untrust policy p5 then permit application-services utm-policy utmp5
Related Topics
JUNOS Software Feature Support Reference for SRX Series and J Series Devices