Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 423

Table of Contents

Advertisement

ScreenOS Threat Management Features
Copyright © 2010, Juniper Networks, Inc.
Enter a comment or description.
4.
View or edit entries in the
5.
Select URL patterns from the list or add new patterns by clicking on
6.
Select
7.
OK.
You can continue to use ScreenOS features to configure and manage AV and Web Filtering
objects, as well as configure ICAP servers.
Configuring Antivirus Objects on page 373
Configuring External AV Profiles on page 374
Configuring Internal AV Profiles on page 375
Configuring ICAP AV Servers and Profiles on page 376
Configuring ICAP AV Profiles on page 377
Configuring Web Filtering Objects on page 378
Configuring Antivirus Objects
Security devices provide one or more of the following antivirus scanning methods:
External AV scanning—This method forwards traffic to a Trend Micro device for
scanning. (This option is not supported by devices running ScreenOS 5.3 or higher.)
The security device forwards all traffic to be scanned to the Trend Micro device. To
configure external AV scanning, use the AV Scanner settings (detailed below).
Internal AV scanning—This method uses the AV scanner on the security device, and is
not supported by all security devices. Internal scanning may be configured on a
per-device basis, or it may be configured via templates. This section describes how to
create the templates.
ICAP AV scanning—This method forwards traffic to an Internet Content Adaptation
Protocol (ICAP) server for examination. To forward traffic to an ICAP server, create an
ICAP server object, create an ICAP profile, and then specify that profile in a policy.
box.
UTM Pattern Entries
Chapter 8: Configuring Objects
+
.
373

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents