[Prev][Next][Report an Error]
J-Web Configuration
To configure local list antispam using the J-Web Configuration
editor, you must first create your local whitelist and blacklist custom
objects.
Configure a URL Pattern List Custom Object as follows:
- Select Configure>Security>UTM>Custom
Objects.
- In the UTM custom objects configuration window,
select the URL Pattern List tab.
- Click Add to create URL pattern
lists.
- Next to URL Pattern Name, enter a unique name for
the list you are creating.
If you are creating a whitelist, it is helpful to indicate this
in the list name. The same applies to a blacklist. The name you enter
here becomes available in the Address Whitelist and Address Blacklist
fields when you are configuring your antispam profiles.
- Next to URL Pattern Value, enter the URL pattern
for whitelist or blacklist antispam filtering.
 |
Note:
URL pattern wildcard support—The wildcard rule is as follows: \*\.[]\?* and you must precede all wildcard URLs with http://. You can only use “*” if it is at the beginning
of the URL and is followed by a “.”. You can
only use “?” at the end of the URL.
The following wildcard syntax IS supported: http://*.juniper.net, http://www.juniper.ne?, http://www.juniper.n??. The following wildcard syntax is NOT supported: *.juniper.net ,
www.juniper.ne?, http://*juniper.net, http://*.
|
- Click Add to add your URL
pattern to the Values list box.
The list can contain up to 8192 items.
- Click OK.
- If the configuration item is saved successfully,
you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details in the pop-up window that appears to discover why.
 |
Note:
Because you use URL Pattern Lists to create Custom URL Category
Lists, you must configure URL Pattern List Custom Objects before you
configure a Custom URL Category List. URL Pattern List Custom Objects
are described in the previous section.
|
Configure a Custom URL Category List Custom Object as follows:
- Select Configure>Security>UTM>Custom
Objects.
- In the UTM custom objects configuration window,
select the URL Category List tab.
- Click Add to create URL category
lists.
- Next to URL Category Name, enter a unique name
for the list you are creating. This name appears in the Address Whitelist
list when you configure antispam global options.
- In the Available Values box, select a URL Pattern
List name from the list for bypassing scanning and click the right
arrow button –> to move it to the Selected Values box.
Continue to add URLs or IP addresses in this manner.
- Click OK to save the selected
values as part of the custom URL list you have created.
- If the configuration item is saved successfully,
you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details in the pop-up window that appears to discover why.
Now that you have created your whitelist and blacklist custom
objects, you can configure antispam filtering to use those lists.
- Select Configure>Security>UTM>Global
options.
- Select the Anti-Spam tab in
the right pane.
- Under Anti-Spam , select an Address
Whitelist and/or an Address Blacklist from
the list for local lists for spam filtering.
These lists are configured as Custom Objects and are made available
for selection here.
- Click OK.
- If the configuration item is saved successfully,
you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details in the pop-up window that appears to discover why.
- Select the Anti-Spam tab in
the left pane under Security.
- Click Add to configure an
anti-spam profile.
The profile configuration pop-up window appears.
- In the Profile name box, enter a unique name for
the antispam profile you are creating.
- If you are using the default server, select Yes beside Default SBL server. If you are not using
the default server, select No.
If you select No, you are disabling server-based spam filtering.
You would disable it if you are using only local lists or if you do
not have a license for server-based spam filtering.
- In the Custom tag string box, enter a custom string
for identifying a message as spam.
By default, the devices uses ***SPAM***.
- In the Actions list, select one of the following: Tag subject, Block email, or Tag header.
Here you are selecting the action to be taken by the device
when spam is detected.
- Click OK to save your profile.
- If the configuration item is saved successfully,
you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details in the pop-up window that appears to discover why.
Next, you configure a UTM policy for SMTP to which you attach
the antispam profile you have configured.
- Select Configure>Security>Policy>UTM
Policies.
- In the UTM policy configuration window, click Add to configure a UTM policy.
The policy configuration pop-up window appears.
- Select the Main tab in pop-up
window.
- In the Policy name box, enter a unique name for
the UTM policy you are creating.
- In the Session per client limit box, enter a session
per client limit from 0 to 20000 for this UTM policy.
- In the Session per client over limit list, select
one of the following: Log and permit, Block.
This is the action the device takes when the session per client
limit for this UTM policy is exceeded.
- Select the Anti-Spam profiles tab in the pop-up window.
- From the SMTP profile list, select the antispam
profile you are attaching to this UTM policy.
- Click OK to save your policy.
- If the policy is saved successfully, you receive
a confirmation and you must click OK again. If
the profile is not saved successfully, you can click Details in the pop-up window that appears to discover why.
Next, you attach the UTM policy to a security policy that you
create.
- Select Configure>Security>Policy>FW
Policies.
- In the Security Policy window, click Add to configure a security policy with UTM.
The policy configuration pop-up window appears.
- In the Policy tab, enter a name in the Policy Name
box.
- Next to From Zone, select a zone from the list.
- Next to To Zone, select a zone from the list.
- Choose a Source Address.
- Choose a Destination Address.
- Choose an Application.
Do this by selecting junos-smtp (for antispam)
in the Application Sets box and clicking the —> button to move
it to the Matched box.
- Next to Policy Action, select one of the following: Permit, Deny, or Reject.
 |
Note:
When you select Permit for policy action, several additional
fields become available in the Applications Services tab, including
UTM Policy.
|
- Select the Application Services tab in the pop-up window.
- Next to UTM Policy, select the appropriate policy
from the list.
This attaches your UTM policy to the security policy.
 |
Note:
There are several fields in this pop-up window that are not
described in this section. See the section on Security Policies for
detailed information on configuring security policies and all the
available fields.
|
- Click OK to save your policy.
- If the policy is saved successfully, you receive
a confirmation and you must click OK again. If
the profile is not saved successfully, you can click Details in the pop-up window that appears to discover why.
 |
Note:
You must activate your new policy to apply it.
|
[Prev][Next][Report an Error]
help_page