PART 2
Configuring Intrusion Detection and
Prevention Devices
Copyright © 2010, Juniper Networks, Inc.
Configuring Profiler Settings on page 13
Configuring Security Policies on page 31
Working with Attack Objects on page 61
Configuring SNMP and Syslog Settings on page 79
Configuring Anti-Spoof Settings on page 83
Configuring Intrusion Detection and Prevention Device Settings on page 87
Configuring Additional Intrusion Detection and Prevention Features on page 111
11