1. Juniper Networks TechLibrary
"Understanding Screen Options": This document explicitly lists and describes the available screen protections on SRX Series devices. It details protections against DoS attacks (including ICMP Flood) and IP-based attacks (including IP Spoofing).
URL: https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/concept/security-screen-ids-understanding.html
2. Juniper Networks TechLibrary
"Example: Configuring Screen Options to Prevent DoS Attacks": This guide provides a configuration example for mitigating DoS attacks
specifically mentioning the icmp flood screen option.
URL: https://www.juniper.net/documentation/us/en/software/junos/security-policies/topics/example/security-screen-dos-attack-configuring.html
3. Juniper Networks TechLibrary
"Security Policies with UTM": This documentation describes the UTM features
including the anti-virus feature which scans traffic for malware in protocols like SMTP
IMAP
and POP3
demonstrating this is separate from screen functions.
URL: https://www.juniper.net/documentation/us/en/software/junos/utm/topics/concept/utm-security-policy-overview.html