Juniper devices do not have an equivilent to the Cisco VTY. I'm not sure what you mean when you say the device isn't using a loopback interface, as it is the connection between the data plane and control plane. It exists by default on all Juniper devices even if it isn't configured, and does not require an address.
The standard way to control access to a Juniper device is with a firewall filter applied to the loopback interface, as in your example. This filter will restrict all traffic to the control plane, including management traffic like SSH, telnet, or NTP, as well as all routing protocol traffic - so this filter must take into account all possible traffic the control plane needs, or it needs to restrict the specific traffic you want to limit and allow all other traffic.
Once applied to the loopback interface, this filter will limit all traffic to the device itself on any IP address configured on the device regardless of what interface the IP may be assigned to. The filter could also be applied to the individual interfaces, but would only apply to traffic on that specific interface. The loopback filter approach is a more comprehensive way to protect the device.