- play_arrow Set Up
- play_arrow Juniper Advanced Threat Prevention Cloud Overview
- play_arrow Enroll SRX Series Firewalls to Juniper Advanced Threat Prevention Cloud
- play_arrow Configure Security Policies on SRX Series Firewall
- play_arrow Configure SRX Series Firewall
- Configure the SRX Series Firewall to Block Outbound Requests to a C&C Host
- Configure the SRX Series Firewall to Block Infected Hosts
- Configure Reverse Proxy on the SRX Series Firewall
- Configure the IMAP Emails Policy on the SRX Series Firewall
- Configure the SMTP Emails Policy on the SRX Series Firewall
-
- play_arrow Configuration Statements and Operational Commands
- play_arrow SRX Series Firewall Commands to Configure Juniper ATP Cloud
-
- play_arrow Use Cases
- play_arrow SecIntel Feeds for MX Series Routers
- play_arrow Amazon Web Services GuardDuty with vSRX Virtual Firewall
- play_arrow Juniper ATP Cloud with Policy Enforcer
-
- play_arrow Troubleshoot
- Juniper ATP Cloud Troubleshooting Overview
- Troubleshooting Juniper ATP Cloud: Checking DNS and Routing Configurations
- Troubleshooting Juniper ATP Cloud: Checking Certificates
- Troubleshooting Juniper ATP Cloud: Checking the Routing Engine Status
- Troubleshooting Juniper ATP Cloud: Checking the Application-Identification License
- Viewing Juniper ATP Cloud System Log Messages
- Configure Traceoptions
- View the Traceoptions Log File
- Turning Off Traceoptions
- Juniper ATP Cloud Dashboard Reports Not Displaying
- Juniper ATP Cloud RMA Process
- play_arrow More Documentation
- play_arrow Additional Documentation on Juniper.net
-
Configure Encrypted Traffic Insights
Before You Begin
Enroll the SRX Series Firewall to Juniper ATP Cloud. For more information, see Enroll an SRX Series Firewall Using the CLI.
To enable encrypted traffic insights on SRX Series Firewalls, include the following CLI configurations:
Configure the security-metadata-streaming policy.
content_copy zoom_out_mapset services security-metadata-streaming policy sms_policy http detections encryptedc2 action permit set services security-metadata-streaming policy sms_policy http detections encryptedc2 notification log
Attach the security-metadata-streaming policy to a security firewall policy.
content_copy zoom_out_mapset security policies from-zone trust to-zone untrust application-services security-metadata-streaming-policy sms_policy set security policies from-zone untrust to-zone trust application-services security-metadata-streaming-policy sms_policy
Commit the configuration.
content_copy zoom_out_mapcommit
Use the show services security-metadata-streaming http statistics
command to view the statistics of security metadata streaming policy.
show services security-metadata-streaming http statistics
show services security-metadata-streaming http statistics Security Metadata Streaming session statistics: Session inspected: 10 Session whitelisted: 0 Session detected: 6 Security Metadata Streaming submission statistics: Records submission success: 8 Records submission failure: 2
To view the list of servers that are allowlisted for encrypted traffic insights, use the
show services security-metadata-streaming http whitelist
command.
show services security-metadata-streaming http whitelist
show services security-metadata-streaming http whitelist No. IP-start IP-end Feed Address 1 192 0.5.0 192.0.5.1 eta_custom_whitelist ID-80001400