Which two steps must you take to modify the application?

Microsoft has altered the way their Web-based Hotmail application works. You want to
update your application firewall policy to correctly identify the altered Hotmail application.
Which two steps must you take to modify the application? (Choose two.)

Microsoft has altered the way their Web-based Hotmail application works. You want to
update your application firewall policy to correctly identify the altered Hotmail application.
Which two steps must you take to modify the application? (Choose two.)

A.
user@srx# edit services application-identification my:HOTMAIL

B.
user@srx# edit services custom application-identification my:HOTMAIL

C.
user@srx> request services application-identification application copy junos:HOTMAIL

D.
user@srx> request services application-identification application enable junos:HOTMAIL



Leave a Reply 3

Your email address will not be published. Required fields are marked *


junos

junos

A&D

There is no copy command and there is no custom command

root@Site1> request services application-identification application ?
Possible completions:
disable Disable a predefined application
enable Enable a predefined application

root@Site1# edit services ?
Possible completions:
Execute this command
> application-identification Application identification configuration
> captive-portal Captive Portal options
> flow-monitoring Configure flow monitoring
> ip-monitoring IP monitoring for route action
> rpm Real-time performance monitoring
> service-device-pools Configure service device pools
> service-interface-pools Configure service interface pools
> unified-access-control Configure Unified Access Control
> user-identification Configure user-identification
| Pipe through a command
[edit]

Hassan

Hassan

actually the command request services application-identification application copy predefined-application-name

exists, check that:

Options
copy—(Optional) Copy a predefined application signature from the database to the configuration and change the name (for example, my:FTP). The ID and order are generated automatically. Do not name your custom application signature with the junos prefix; this prefix is reserved for predefined application signatures. You can copy the same predefined application signature only once; duplicate custom signatures are not allowed. The copy command does not initiate signature recompilation.

https://www.juniper.net/documentation/en_US/junos/topics/reference/command-summary/request-services-application-identification-application.html