External Antivirus Scanner Settings Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation

External Antivirus Scanner Settings Overview

Table 40: External AV Scanner Settings
External AV Scanner Options
Maximum Number of TCP connections
Fail Mode Traffic Permit
Fail Mode Scanner Threshold
Maximum AV resources allowed per AV
client
Copyright © 2010, Juniper Networks, Inc.
not assigned to the security device. Instead, they are assigned through a Rule option
in a security policy. See "DNS Server Configuration Using DNS Settings" on page 103.
You can also configure the internal AV scanner to scan webmail responses from a Web
server to a client. For information, see "Internal Antivirus HTTP Webmail Settings
Overview" on page 181.
The various antivirus scan settings are as follows:
External Antivirus Scanner Settings
Internal Antivirus Scan Manager Settings
Internal Antivirus HTTP Webmail Settings
Antivirus Scanner Settings
External Antivirus Scanner Settings Overview on page 177
Internal Antivirus Scan Manager Settings Overview on page 178
Classification of Security Options Overview on page 176
You can use the AV Scanner Settings tab to configure the AV scanner options available
in the UI. Table 40 on page 177 describes the AV Scanner Settings tab options.
Description
The maximum number of connections between the security device and the external
AV scanner.
When enabled, the security device continues to permit traffic even if the device loses
connectivity with the AV scanner.
The number of times the security device consecutively fails to make contact with
the external scanner before going into a 5-minute wait period. After the wait period,
the security device again attempts to reach the external scanner.
The maximum percentage of AV resources that an AV client can consume. The
default is 70%; the acceptable range is from 1to 100%, where 100% allows
unrestricted resource consumption. You might want to edit this option to prevent a
malicious user from generating a large amount of traffic in an attempt to consume
all available resources.
Chapter 6: Security
177

Advertisement

Table of Contents
loading

Table of Contents