?
Solved

Juniper

Posted on 2013-06-11
3
Medium Priority
?
303 Views
Last Modified: 2013-08-29
I am installing a Juniper SRX 210 between my current ASA and our ISPs router to provide web filtering. Has anyone else done this? And do you have any suggestions on the best way to set it up? I'm not familiar at all with the Juniper device. I've used hosted web filtering services in the past so any input would be great and hopefully steer me in the right direction. Thanks.
0
Comment
Question by:rsgdmn
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
Paul S earned 1500 total points
ID: 39239764
Performing Initial Software Configuration on the SRX210 Services Gateway Using the J-Web Interface - Technical Documentation - Support - Juniper Networks
http://www.juniper.net/techpubs/en_US/release-independent/junos/topics/task/configuration/services-gateway-srx210-configuring-with-jweb.html

Juniper Networks - SRX Getting Started - Configure Security Policies - Knowledge Base
http://kb.juniper.net/InfoCenter/index?page=content&id=KB16553

next time try fortinet.
https://www.google.com/search?q=juniper+vs+fortinet
0
 

Author Comment

by:rsgdmn
ID: 39450125
I've requested that this question be deleted for the following reason:

No response
0
 

Author Comment

by:rsgdmn
ID: 39450126
Thanks
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read about achieving the basic levels of HRIS security in the workplace.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question