Junos software release 12.3R6 has been released. The software and
documentation are available for download from the Juniper networks software download page.
Product Affected:
Monday, 24 March 2014
Saturday, 15 March 2014
Junos :Verifying Antivirus Configurations
General Scan Engine Status
Using the CLI, you can view the following scan engine status
items:
Antivirus license key status
- View license expiration dates.
Scan engine status and settings
- View last action result.
- View default file extension list.
Antivirus pattern update server settings
- View update URL (HTTP or HTTPS-based).
- View update interval.
Antivirus pattern database status
- View auto update status.
- View last result of database loading.
- If the download completes, view database version timestamp virus record number.
- If the download fails, view failure reason.
Example status result:
CLI: show security utm anti-virus status
- AV Key Expire Date: 03/01/2010 00:00:00
- Update Server: http://update.juniper-updates.net/AV/SRX210
- interval: 60 minutes
- auto update status: next update in 12 minutes
- last result: new database loaded
- AV signature version: 12/21/2008 00:35 GMT, virus records:
154018
- Scan Engine Info: last action result: No error(0x00000000)
Session Status
Using the CLI, you can view the following session status items:
Antivirus session status displays a snapshot of current antivirus
sessions. It includes
- Maximum supported antivirus session numbers.
- Total allocated antivirus session numbers.
- Total freed antivirus session numbers.
- Current active antivirus session numbers.
CLI: show security utm session
Verifying Antivirus Scan Results Using J-Web
View antivirus scan results using J-Web as follows:
- Select Monitor>UTM>Anti-Virus.
The following information becomes viewable in the right pane.Antivirus license key status
- View license expiration dates.
Antivirus pattern update server settings- View update URL (HTTP or HTTPS-based).
- View update interval.
Antivirus pattern database status- View auto update status.
- View last result of database loading.
- If the download completes, view database version timestamp virus record number.
- If the download fails, view failure reason.
Antivirus statistics provide- The number of scan request being pre-windowed.
- The total number of scan request forwarded to the engine.
- The number of scan requests using scan-all mode.
- The number of scan requests using scan-by-extension mode.
Scan code counters provide- Number of clean files.
- Number of infected files.
- Number of password protected files.
- Number of decompress layers.
- Number of corrupt files.
- When the engine is out of resources.
- When there is an internal error.
Fallback applied status provides either a log-and-permit or block result when the following has occurred- Scan engine not ready.
- Password protected file found.
- Decompress layer too large.
- Corrupt file found.
- Out of resources.
- Timeout occurred.
- Maximum content size reached.
- Too many requests.
- Other.
- You can click the Clear Anti-Virus Statistics button to clear all current viewable statistics and begin collecting new statistics.
Verifying Antivirus Scan Results Using the CLI
Using the CLI, you can view statistics for antivirus requests,
scan results, and fallback counters.
Scan requests provide
- The total number of scan request forwarded to the engine.
- The number of scan request being pre-windowed.
- The number of scan requests using scan-all mode.
- The number of scan requests using scan-by-extension mode.
Scan code counters provide
- Number of clean files.
- Number of infected files.
- Number of password protected files.
- Number of decompress layers.
- Number of corrupt files.
- When the engine is out of resources.
- When there is an internal error.
Fallback applied status provides either a log-and-permit or
block result when the following has occurred
- Scan engine not ready.
- Maximum content size reached.
- Too many requests.
- Password protected file found.
- Decompress layer too large.
- Corrupt file found.
- Timeout occurred.
- Out of resources.
- Other.
CLI: show security utm anti-virus statistics
Tuesday, 4 March 2014
JUNOS : New Features - ALG Overview
An Application Layer Gateway (ALG) is a software component that is designed to manage specific protocols
such as Session Initiation Protocol (SIP) or FTP on Juniper Networks
devices running JUNOS Software. The ALG module is responsible for
Application-Layer aware packet processing.
ALG functionality can be triggered either by a
service or application configured in the security policy:
- A service is an object that identifies an application protocol using Layer 4 information (such as standard and accepted TCP and UDP port numbers) for an application service (such as Telnet, FTP, SMTP, and HTTP).
- An application specifies the Layer 7 application that maps to a Layer 4 service.
A predefined service already has a mapping to a Layer
7 application. However, for custom services, you must link the service
to an application explicitly, especially if you want the policy to
apply an ALG.
ALGs for packets destined to well-known
ports are triggered by service type. The ALG intercepts and analyzes
the specified traffic, allocates resources, and defines dynamic policies
to permit the traffic to pass securely through the device:
- When a packet arrives at the device, the flow module forwards the packet according to the security rule set in the policy.
- If a policy is found to permit the packet, the associated service type or application type is assigned and a session is created for this type of traffic.
- If a session is found for the packet, no policy rule match is needed. The ALG module is triggered if that particular service or application type requires the supported ALG processing.
The ALG also inspects the packet for embedded IP address
and port information in the packet payload, and performs Network Address
Translation (NAT) processing if necessary. The ALG also opens a gate
for the IP address and port number to permit data exchange for the
session. The control session and data session can be coupled to have
the same timeout value, or they can be independent.
Subscribe to:
Posts (Atom)
loading...