An Infected-Host feed lists the hosts that have been compromised and need to be quarantined from communicating with other devices. The feed is in the format of IP addresses all with a threat level of 10, for example xxx.xxx.xxx.133 with threat level 10. You can configure security policies to take enforcement actions on the inbound and outbound traffic to and from a host whose IP address is listed in the feed. The Infected-Host feed is downloaded to the SRX Series device only when the infected host profile is configured and enabled in a firewall policy.
Note Once the Juniper ATP Cloud global threshold for is met for an infected host (see Global Configuration for Infected Hosts), that host is added to the infected hosts feed and assigned a threat level of 10 by the cloud. Therefore all IP addresses in the infected hosts feed are threat level 10.
To create the infected host profile and policy and firewall policy:
root@host# set services security-intelligence profile ih-profile category Infected-Hosts rule if-rule match threat-level [5 6 7 8 9 10] root@host# set services security-intelligence profile ih-profile category Infected-Hosts rule if-rule then action block drop root@host# set services security-intelligence profile ih-profile category Infected-Hosts rule if-rule then log root@host# set services security-intelligence profile cc-profile category CC root@host# set services security-intelligence profile cc-profile rule CC_rule match threat-level [8 9 10] root@host# set services security-intelligence profile cc-profile rule CC_rule then action block drop root@host# set services security-intelligence profile cc-profile rule CC_rule then log root@host# set services security-intelligence profile cc-profile default-rule then action permit
As of Junos 18.1R1. there is support for the block action with HTTP URL redirection for Infected Hosts. During the processing of a session IP address, if the IP address in on the infected hosts list and HTTP traffic is using ports 80 or 8080, infected hosts HTTP redirection can be done. If HTTP traffic is using dynamic ports, HTTP traffic redirection cannot be done. See command below.
root@host# show services security-intelligence profile ih-profile category Infected-Hosts; rule if-rule { match { threat-level [ 5 6 7 8 9 10 ]; } then { action { block { drop; } } log; } }
root@host# show services security-intelligence profile cc-profile category CC; rule CC_rule { match { threat-level [ 8 9 10 ]; } then { action { block { drop; } } log; } }
root@host# set services security-intelligence policy infected-host-cc-policy Infected-Hosts ih-profile
root@host# set services security-intelligence policy infected-host-cc-policy CC cc-profile
root@host# set security policies from-zone trust to-zone untrust policy p2 match source-address any destination-address any application any root@host# set security policies from-zone trust to-zone untrust policy p2 then permit application-services security-intelligence-policy infected-host-cc-policy
root@host# show security policies ...
from-zone trust to-zone untrust { policy p2 { match { source-address any; destination-address any; application any; } then { permit { application-services { security-intelligence-policy infected-host-cc-policy; } } } } } ... [edit]