[Prev][Next][Report an Error]
J-Web Configuration
To configure Web filtering using the J-Web Configuration editor,
if you are using custom objects, you must first create those custom
objects. (URL pattern list, custom URL category list).
 |
Note:
Rather than or in addition to custom object lists, you can use
included default lists and included white list and black list categories.
See the JUNOS Software Security Configuration Guide for profile list information.
|
Configure a URL Pattern List Custom Object as follows:
 |
Note:
Because you use URL pattern lists to create custom URL category
lists, you must configure URL pattern list custom objects before you
configure a custom URL category list.
|
- Select the Configure tab
at the top of the page.
- Select Security in the left
pane to expand it.
- Select UTM in the left pane,
under Security, to expand the UTM category. Once UTM is expanded,
Anti-Virus, Web Filtering, Anti-Spam, Content Filtering, Custom Objects,
and Global options become available.
- Select Custom Objects in the
left pane.
- From the URL Pattern List tab
in the right pane, click the Add button to create
URL pattern lists.
- Next to URL Pattern Name, enter a unique name for
the list you are creating. This name appears in the Custom URL Category
List Custom Object page for selection.
- Next to URL Pattern Value, enter the URL or IP
address you want added to list for bypassing scanning.
 |
Note:
URL pattern wildcard support— The wildcard rule is as
follows: \*\.[]\?* and you must precede all wildcard URLs with http://.
You can only use “*” if it is at the beginning of the
URL and is followed by a “.”. You can only use “?”
at the end of the URL.
The following wildcard syntax IS supported: http://*.juniper.net,
http://www.juniper.ne?, http://www.juniper.n??. The following wildcard
syntax is NOT supported: *.juniper.net , www.juniper.ne?, http://*juniper.net,
http://*.
|
- Click the Add button to add
your URL pattern to the Values list box. The list can contain up to
8192 items. You can also select an entry and use the Delete button
to delete it from the list. Continue to add URLs or IP addresses in
this manner.
- Click the OK button to save
the selected values as part of the URL pattern list you have created.
- If the configuration item is saved successfully,
you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details on
a pop-up window to discover why.
Configure a custom URL category list custom object as follows:
 |
Note:
Because you use URL pattern lists to create custom URL category
lists, you must configure URL pattern list custom objects before you
configure a custom URL category list. URL pattern list custom objects
are described in J-Web Configuration.
|
- Select the Configure tab
at the top of the page.
- Select Security in the left
pane to expand it.
- Select UTM in the left pane,
under Security, to expand the UTM category. Once UTM is expanded,
Anti-Virus, Web Filtering, Anti-Spam, Content Filtering, Custom Objects,
and Global options become available.
- Select Custom Objects in the
left pane.
- From the URL Category List tab in the right pane, click the Add button
to create URL category lists.
- Next to URL Category Name, enter a unique name
for the list you are creating. This name appears in the URL Whitelist,
Blacklist, and Custom Category lists when you configure Web filtering
global options.
- In the Available Values box, select a URL Pattern
List name from the list for bypassing scanning and click the right
arrow button to move it to the Selected Values box.
- Click the OK button to save
the selected values as part of the custom URL list you have created.
- If the configuration item is saved successfully,
you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details on
a pop-up window to discover why.
Now that your custom objects have been created, you can configure
the integrated Web filtering feature profile.
- Select the Configure tab
at the top of the page.
- Select Security in the left
pane to expand it.
- Select UTM in the left pane,
under Security, to expand the UTM category. Once UTM is expanded,
Anti-Virus, Web Filtering, Anti-Spam, Content Filtering, Custom Objects,
and Global options become available.
- Select Global options in the
left pane.
- In the Web Filtering tab in
the right pane, next to URL whitelist, select the Custom URL list
you created from the available options. This is the first filtering
category that both integrated and redirect Web filtering use. If there
is no match, the URL is sent to the SurfControl server.
- Next to URL blacklist, select the Custom URL list
you created from the list. This is the first filtering category that
both integrated and redirect Web filtering use. If there is no match,
the URL is sent to the SurfControl server.
- In the Filtering Type section, select the type
of Web filtering engine you are using. In this case, you would select Surf Control Integrated.
- In the SurfControl Integrated options section,
next to Cache timeout, enter a timeout limit in minutes for expiring
cache entries. (24 hours is the default and the maximum allowed life
span.)
- Next to Cache Size, enter a size limit, in kilobytes,
for the cache. (500 KB is the default.)
- Next to Server Host, enter the Surf Control server
name or IP address.
- Next to Server Port, enter the port number for
communicating with the Surf Control server. (Default ports are 80,
8080, and 8081.)
- Click the OK button to save
these values.
- If the configuration item is saved successfully,
you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details on
a pop-up window to discover why.
- Select Web Filtering, under
Security, in the left pane.
- Click the Add button in the
right window to create a profile for Surf Control Integrated Web filtering.
(To edit an existing item, select it and click the Edit button.)
- In the Main tab, next to Profile
name, enter a unique name for this Web filtering profile.
- Select the Profile Type. In this case, select Surf Control.
- Next to Default action, select Permit, Log and permit, or Block. This is the default action for this profile for requests
that experience errors.
- Next to Custom Block Message, enter a custom message
to be sent when HTTP requests are blocked.
- Next to Timeout, enter a value, in seconds. Once
this limit is reached, fail mode settings are applied. The default
here is 10 seconds. You can enter a value from 10 to 240 seconds.
- Next to Custom block message subject, enter text
to appear in the subject line of your custom message for this block
notification.
- Select the Fallback options tab.
- Next to Default, select Log and
Permit or Block as the action to occur when
a request fails for any reason not specifically called out.
- Next to Server Connectivity, select Log and Permit or Block as the action to
occur when a request fails for this reason.
- Next to Timeout, select Log and
Permit or Block as the action to occur when
a request fails for this reason.
- Next to Too Many Requests, select Log and Permit or Block as the action to
occur when a request fails for this reason.
- Select the URL category action
list tab.
- In the custom URL category list section, click
the Add button to use a configured custom URL
category list custom object in the profile.
- Next to Categories, select a configured custom
object from the list.
- Next to Actions, select Permit, Block, or Log and Permit from the list.
- Click the Add button.
- Click OK.
- If the configuration item is saved successfully,
you receive a confirmation and you must click OK again. If it is not saved successfully, you can click Details on
a pop-up window to discover why.
Next, you configure a UTM policy for Web filtering to which
you attach the content filtering profile you have configured.
- Select the Configure tab
at the top of the page.
- Select Security in the left
pane to expand it.
- Select Policy in the left
pane to expand it.
- Select UTM Policies in the
left pane.
- From the UTM policy configuration window in the
right pane, click the Add button at the top of
the screen to configure a UTM policy. This takes you to the policy
configuration pop-up screen.
- Select the Main tab in pop-up
screen.
- In the Policy Name box, enter a unique name for
the UTM policy you are creating.
- In the Session per client limit box, enter a session
per client limit from 0 to 20000 for this UTM policy.
- For Session per client over limit, select one of
the following: Log and Permit, Block. This is the action the device takes when the session
per client limit for this UTM policy is exceeded.
- Select the Web Filtering profiles tab in the pop-up screen.
- Next to HTTP profile, select the profile you have
configured from the list.
- Click OK.
- If the policy is saved successfully, you receive
a confirmation and you must click OK again. If
the profile is not saved successfully, you can click Details on a
pop-up window to discover why.
Next, you attach the UTM policy to a security policy that you
create.
- Select the Configure tab
at the top of the page.
- Select Security in the left
pane to expand it.
- Select Policy in the left
pane to expand it.
- Select FW Policies in the
left pane.
- From the Security Policy window in the right pane,
click the Add button at the top of the screen
to configure a security policy with UTM. This takes you to the policy
configuration pop-up screen.
- In the Policy tab, enter a
name in the Policy Name box.
- Next to From Zone, select a zone from the list.
- Next to To Zone, select a zone from the list.
- Choose a Source Address.
- Choose a Destination Address.
- Choose an Application. Do
this by selecting junos-<protocol> (for all protocols that support
Web filtering, http in this case) in the Application Sets box and
clicking the —> button to move them to the Matched box.
- Next to Policy Action, select one of the following: Permit, Deny, Reject.
 |
Note:
When you select Permit for Policy Action, several additional
fields become available in the Applications Services tab, including
UTM Policy.
|
- Select the Application Services tab in the pop-up screen.
- Next to UTM Policy, select the appropriate policy
from the list. This attaches your UTM policy to the security policy.
 |
Note:
There are several fields on this page that are not described
in this section. See the section on Security Policies for detailed
information on configuring security policies and all the available
fields.
|
- Click OK.
- If the policy is saved successfully, you receive
a confirmation and you must click OK again. If
the profile is not saved successfully, you can click Details on a
pop-up window to discover why. You must Activate your policy in order
to apply it.
[Prev][Next][Report an Error]
help_page