Modifying Idp Rulebase Rules (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Configuring Intrusion Detection and Prevention Devices Guide

Modifying IDP Rulebase Rules (NSM Procedure)

Table 20: IDP Rulebase Rule Properties
Property
ID
Match
Look For
Action
IP Action
Notification
VLAN Tag
36
Configuring Predefined Security Policies (NSM Procedure) on page 33
Modifying IDP Rulebase Rules (NSM Procedure) on page 36
Assigning a Security Policy in an Intrusion Detection and Prevention Device (NSM
Procedure) on page 117
This procedure assumes you have used the New Policy wizard to create a basic policy
that you can modify.
The primary IDP security policy rulebase is the IDP rulebase. The IDP rulebase enables
the IDP process engine to inspect matching traffic for signs of an attack.
For background on and examples of IDP rulebase rules, see the IDP Concepts & Examples
Guide.
To modify IDP rulebase rules:
In the NSM navigation tree, select Configure > Policy Manager > Security Policies.
1.
Select the security policy you want to edit.
2.
In the security policy pane, select IDP tab to display the IDP rulebase table.
3.
To add, delete, copy, or reorder rules, right-click the table cell for the rule number
4.
and make your selection.
To modify the property of a rule, right-click the table cell for the property and make
5.
your selection. Table 20 on page 36 lists the rule properties you can modify and
provides references documentation for these properties.
Reference
Identification number of the IDP rules that you add.
You can select the zone from which the source sends traffic to the destination zone.
You can select the attacks that you want add IDP to match in the monitored traffic.
Specifies the action you want IDP to perform against the current connection.
Specifies the action you want IDP to perform against future connections that use the same IP
address.
You can choose none, or enable logging and select the logging options that are appropriate for your
network.
Specifies the VLAN tags you want to match in applying the rule.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents