[Prev][Next][Report an Error]

J-Web Configuration

To configure local list antispam using the J-Web Configuration editor, you must first create your local white and black list custom objects.

Configure a URL Pattern List Custom Object as follows:

  1. Select the Configure tab at the top of the page.
  2. Select Security in the left pane to expand it.
  3. Select UTM in the left pane, under Security, to expand the UTM category. Once UTM is expanded, Anti-Virus, Web Filtering, Anti-Spam, Content Filtering, Custom Objects, and Global options become available.
  4. Select Custom Objects in the left pane.
  5. From the UTM custom objects configuration window in the right pane, select the URL Pattern List tab.
  6. Click the Add button at the top of the window to create URL pattern lists.
  7. Next to URL Pattern Name, enter a unique name for the list you are creating. If you are creating a white list, it is helpful to indicate this in the list name. The same applies to a black list. The name you enter here becomes available in the Address Whitelist and Address Blacklist fields when you are configuring your antispam profiles.
  8. Next to URL Pattern Value, enter the URL pattern for white list or black list antispam filtering.

    Note: URL pattern wildcard support— The wildcard rule is as follows: \*\.[]\?* and you must precede all wildcard URLs with http://. You can only use “*” if it is at the beginning of the URL and is followed by a “.”. You can only use “?” at the end of the URL.

    The following wildcard syntax IS supported: http://*.juniper.net, http://www.juniper.ne?, http://www.juniper.n??. The following wildcard syntax is NOT supported: *.juniper.net , www.juniper.ne?, http://*juniper.net, http://*.

  9. Click the Add button to add your URL pattern to the Values list box. The list can contain up to 8192 items.
  10. Click OK.
  11. If the configuration item is saved successfully, you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details on a pop-up window to discover why.

Note: Because you use URL Pattern Lists to create Custom URL Category Lists, you must configure URL Pattern List Custom Objects before you configure a Custom URL Category List. URL Pattern List Custom Objects are described in the previous section.

Configure a Custom URL Category List Custom Object as follows:

  1. Select the Configure tab at the top of the page.
  2. Select Security in the left pane to expand it.
  3. Select UTM in the left pane, under Security, to expand the UTM category. Once UTM is expanded, Anti-Virus, Web Filtering, Anti-Spam, Content Filtering, Custom Objects, and Global options become available.
  4. Select Custom Objects in the left pane.
  5. From the UTM custom objects configuration window in the right pane, select the URL Category List tab.
  6. Click the Add button at the top of the window to create URL category lists.
  7. Next to URL Category Name, enter a unique name for the list you are creating. This name appears in the Address Whitelist list when you configure antispam global options.
  8. In the Available Values box, select a URL Pattern List name from the list for bypassing scanning and click the right arrow button to move it to the Selected Values box. Continue to add URLs or IP addresses in this manner.
  9. Click the OK button to save the selected values as part of the custom URL list you have created.
  10. If the configuration item is saved successfully, you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details on a pop-up window to discover why.

Now that you have created your white list and black list custom objects, you can configure antispam filtering to use those lists:

  1. Select the Configure tab at the top of the page.
  2. Select Security in the left pane to expand it.
  3. Select UTM in the left pane, under Security, to expand the UTM category. Once UTM is expanded, Anti-Virus, Web Filtering, Anti-Spam, Content Filtering, Custom Objects, and Global options become available.
  4. Select Global options in the left pane.
  5. Select the Anti-Spam tab in the right screen.
  6. Under Anti-Spam , select an Address Whitelist and/or an Address Blacklist from the list for local lists for spam filtering. These lists are configured as Custom Objects and are made available for selection here.
  7. Click the OK button.
  8. If the configuration item is saved successfully, you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details on a pop-up window to discover why.
  9. Select the Anti-Spam tab in the left pane under Security.
  10. Click the Add button to configure an anti-spam profile. This takes you to the profile configuration pop-up screen.
  11. In the Profile name box, enter a unique name for the antispam profile you are creating.
  12. If you are using the default server, select Yes beside Symantec default SBL server. If you are not using the default server, select No. If you select No, you are disabling server-based spam filtering. You would disable it if you are using only local lists or if you do not have a license for server-based spam filtering.
  13. In the Custom tag string box, enter a custom string for identifying a message as spam. By default, the devices uses ***SPAM***.
  14. In the Actions list, select one of the following: Tag subject, Block email, or Tag header. Here you are selecting the action to be taken by the device when spam is detected.
  15. Click OK to save your profile.
  16. If the configuration item is saved successfully, you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details on a pop-up window to discover why.

Next, you configure a UTM policy for SMTP to which you attach the antispam profile you have configured.

  1. Select the Configure tab at the top of the page.
  2. Select Security in the left pane to expand it.
  3. Select Policy in the left pane.
  4. Select UTM Policies in the left pane.
  5. From the UTM policy configuration window in the right pane, click the Add button at the top of the screen to configure a UTM policy. This takes you to the policy configuration pop-up screen.
  6. Select the Main tab in pop-up screen.
  7. In the Policy name box, enter a unique name for the UTM policy you are creating.
  8. In the Session per client limit box, enter a session per client limit from 0 to 20000 for this UTM policy.
  9. In the Session per client over limit list, select one of the following: Log and permit, Block. This is the action the device takes when the session per client limit for this UTM policy is exceeded.
  10. Select the Anti-Spam profiles tab in the pop-up screen.
  11. From the SMTP profile list, select the antispam profile you are attaching to this UTM policy.
  12. Click OK to save your policy.
  13. If the policy is saved successfully, you receive a confirmation and you must click OK again. If the profile is not saved successfully, you can click Details on a pop-up window to discover why.

Next, you attach the UTM policy to a security policy that you create.

  1. Select the Configure tab at the top of the page.
  2. Select Security in the left pane to expand it.
  3. Select Policy in the left pane.
  4. Select FW Policies in the left pane.
  5. From the Security Policy window in the right pane, click the Add button at the top of the screen to configure a security policy with UTM. This takes you to the policy configuration pop-up screen.
  6. In the Policy tab, enter a name in the Policy Name box.
  7. Next to From Zone, select a zone from the list.
  8. Next to To Zone, select a zone from the list.
  9. Choose a Source Address.
  10. Choose a Destination Address.
  11. Choose an Application. Do this by selecting junos-smtp (for antispam) in the Application Sets box and clicking the —> button to move it to the Matched box.
  12. Next to Policy Action, select one of the following: Permit, Deny, Reject.

    Note: When you select Permit for Policy Action, several additional fields become available in the Applications Services tab, including UTM Policy.

  13. Select the Application Services tab in the pop-up screen.
  14. Next to UTM Policy, select the appropriate policy from the list. This attaches your UTM policy to the security policy.

    Note: There are several fields on this pop-up screen that are not described in this section. See the section on Security Policies for detailed information on configuring security policies and all the available fields.

  15. Click OK to save your policy.
  16. If the policy is saved successfully, you receive a confirmation and you must click OK again. If the profile is not saved successfully, you can click Details on a pop-up window to discover why.

    Note: You must Activate your new policy to apply it.


[Prev][Next][Report an Error]