How do you apply UTM enforcement to security policies on the branch SRX series?

How do you apply UTM enforcement to security policies on the branch SRX series?

How do you apply UTM enforcement to security policies on the branch SRX series?

A.
UTM profiles are applied on a security policy by policy basis.

B.
UTM profiles are applied at the global policy level.

C.
Individual UTM features like anti-spam or anti-virus are applied directly on a security policy by policy basis.

D.
Individual UTM features like anti-spam or anti-virus are applied directly at the global policy level.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


ketan2809

ketan2809

Answer B

The UTM policy within the Junos OS leverages security policies as a central point where traffic is classified and directed to the appropriate modules for processing. Traffic traversing the security zones of the SRX device are matched against a security policy. If the security policy contains a UTM policy that matches a protocol supported by UTM, namely SMTP, Post Office Protocol 3 (POP3) or Internet Message Access Protocol (IMAP), Hyptertext Transfer Protocol (HTTP), or FTP, then the application protocol data is sent to the UTM feature profile. Each feature profile determines the specific configuration for each feature (antivirus, content filtering, Web filtering, and antispam).