Solved

Juniper

Posted on 2013-06-11
3
296 Views
Last Modified: 2013-08-29
I am installing a Juniper SRX 210 between my current ASA and our ISPs router to provide web filtering. Has anyone else done this? And do you have any suggestions on the best way to set it up? I'm not familiar at all with the Juniper device. I've used hosted web filtering services in the past so any input would be great and hopefully steer me in the right direction. Thanks.
0
Comment
Question by:rsgdmn
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
Paul S earned 500 total points
ID: 39239764
Performing Initial Software Configuration on the SRX210 Services Gateway Using the J-Web Interface - Technical Documentation - Support - Juniper Networks
http://www.juniper.net/techpubs/en_US/release-independent/junos/topics/task/configuration/services-gateway-srx210-configuring-with-jweb.html

Juniper Networks - SRX Getting Started - Configure Security Policies - Knowledge Base
http://kb.juniper.net/InfoCenter/index?page=content&id=KB16553

next time try fortinet.
https://www.google.com/search?q=juniper+vs+fortinet
0
 

Author Comment

by:rsgdmn
ID: 39450125
I've requested that this question be deleted for the following reason:

No response
0
 

Author Comment

by:rsgdmn
ID: 39450126
Thanks
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
RDP Sonicwall 8 88
No RSTP between switches 3 66
cradle point vpn to sonicwall 5 96
Need extreme network security for home 16 85
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question