- play_arrow Set Up
- play_arrow Juniper Advanced Threat Prevention Cloud Overview
- play_arrow Enroll SRX Series Firewalls to Juniper Advanced Threat Prevention Cloud
- play_arrow Configure Security Policies on SRX Series Firewall
- play_arrow Configure SRX Series Firewall
- Configure the SRX Series Firewall to Block Outbound Requests to a C&C Host
- Configure the SRX Series Firewall to Block Infected Hosts
- Configure Reverse Proxy on the SRX Series Firewall
- Configure the IMAP Emails Policy on the SRX Series Firewall
- Configure the SMTP Emails Policy on the SRX Series Firewall
-
- play_arrow Configure
- play_arrow Configure ATP Cloud Features on SRX Series Firewall
- Encrypted Traffic Insights Overview
- Configure Encrypted Traffic Insights
- Adaptive Threat Profiling Overview
- Configure and Deploy Adaptive Threat Profiling
- Adaptive Threat Profiling Use Cases
- Enable DNS SecIntel Detection
- DNS DGA Detection Overview
- Enable DNS DGA Detection
- DNS Tunnel Detection Overview
- Enable DNS Tunnel Detection
- DNS Sinkhole Overview
- Configure DNS Sinkhole
- DNS Security Logs
- Geolocation IPs and Juniper ATP Cloud
- Configure Juniper ATP Cloud with Geolocation IP
- Configure IPFilter Category
- Configure Reverse Shell Detection
- play_arrow Configure AI Predictive Threat Prevention on SRX Series Firewall
-
- play_arrow Configuration Statements and Operational Commands
- play_arrow SRX Series Firewall Commands to Configure Juniper ATP Cloud
-
- play_arrow Use Cases
- play_arrow SecIntel Feeds for MX Series Routers
- play_arrow Amazon Web Services GuardDuty with vSRX Virtual Firewall
- play_arrow Juniper ATP Cloud with Policy Enforcer
-
- play_arrow More Documentation
- play_arrow Additional Documentation on Juniper.net
-
Troubleshooting Juniper ATP Cloud: Checking the Routing Engine Status
Use the show services advanced-anti-malware status
CLI command to show the connection status from the control plane
or routing engine.
show services advanced-anti-malware status Server connection status: Server hostname: xxx.xxx.xxx.xxx.com Server port: 443 Control Plane: Connection Time: 2015-12-01 08:58:02 UTC Connection Status: Connected Service Plane: fpc0 Connection Active Number: 0 Connection Failures: 0
If the connection fails, the CLI command will display the reason in the Connection Status field. Valid options are:
Not connected
Initializing
Connecting
Connected
Disconnected
Connect failed
Client certificate not configured
Request client certificate failed
Request server certificate validation failed
Server certificate validation succeeded
Server certificate validation failed
Server hostname lookup failed