Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Configure the IMAP Emails Policy on the SRX Series Firewall

Unlike file scanning policies where you define an action permit or action block statement, with IMAP email management the action to take is defined in the Configure > Emails > IMAP window. All other actions are defined with CLI commands as before.

Note:

In the IMAP window on Juniper ATP Cloud, you can select all IMAP servers or specific IMAP servers and list them. Therefore the IMAP configuration sent to the SRX Series Firewall has a flag called “process_all_traffic” which defaults to True, and a list of IMAP servers, which may be empty. In the case where “process_all_traffic” is set to True, but there are servers listed in the IMAP server list, then all servers are processed regardless of the server list. If “process_all_traffic” is not set to True, only the IMAP servers in the server list are processed.

Shown below is an example policy with email attachments addressed in profile profile2.

In the above example, the email profile (profile2) looks like this:

The firewall policy is similar to before. The AAMW policy is place in trust to untrust zone. See the example below.

Shown below is another example, using the show services advanced-anti-malware policy CLI command. In this example, emails are quarantined if their attachments are found to contain malware. A verdict score of 8 and above indicates malware.

Optionally you can configure forward and reverse proxy for server and client protection, respectively. For example, if you are using IMAPS, you may want to configure reverse proxy. For more information on configuring reverse proxy, see Configure Reverse Proxy on the SRX Series Firewall.

Use the show services advanced-anti-malware statistics CLI command to view statistical information about email management.

As before, use the clear services advanced-anti-malware statistics CLI command to clear the above statistics when you are troubleshooting.

Before configuring the IMAP threat prevention policy, make sure you have done the following:

  • Define the action to take (block or deliver malicious messages) and the end-user email notification in the Configure > Emails > IMAP window.

  • (Optional) Create a profile in the Configure > Device Profiles window to indicate which email attachment types to scan. Or, you can use the default profile.

The following steps show the minimum configuration. To configure the threat prevention policy for IMAP using the CLI:

  1. Create the Juniper ATP Cloud policy.
    • In this example, the policy name is imappolicy1.

    • Associate the policy with the IMAP profile. In this example, it is the default_profile profile.

    • Configure your global threshold. If a verdict comes back equal to or higher than this threshold, then it is considered to be malware. In this example, the global threshold is set to 7.

    • Apply the IMAP protocol and turn on notification.

    • If the attachment has a verdict less than 7, create log entries.

    • When there is an error condition, send the email to the recipient and create a log entry.

  2. Configure the firewall policy to enable the advanced anti-malware application service.
  3. In this example, we will configure the reverse proxy.

    For reverse proxy:

    • Load the CA certificate.

    • Load the server certificates and their keys into the SRX Series Firewall certificate repository.

    • Attach the server certificate identifier to the SSL proxy profile.