Specifying Rule Targets; Specifying Rule Severity - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Table 27: IDP Rulebase VLAN Tag Settings
Option
Description
None
Matches only traffic that has no VLAN tag.
Any
Matches traffic with any or no VLAN tag (default).
Select VLAN Tags
Displays the Select VLAN Tags dialog box where you can set a single VLAN tag or a range of VLAN
tags.
Delete VLAN Tags
Displays a dialog box that prompts you to confirm you want to delete the VLAN tag match setting.

Specifying Rule Targets

Specifying Rule Severity

Table 28: IDP Rulebase Severity
Severity
Description
Default
Select Default to inherit severity from that specified in the attack object.
Critical
Attacks that attempt to evade an IPS, crash a machine, or gain system-level privileges.
We recommend that you drop the packets or drop the connection for such attacks.
Major
Attacks that attempt to crash a service, perform a denial of service, install or use a Trojan, or gain
user-level access to a host.
We recommend that you drop the packets or drop the connection for such attacks.
Minor
Attacks that attempt to obtain critical information through directory traversal or information leaks.
We recommend that you log such attacks.
Warning
Attacks that attempt to obtain noncritical information or scan the network. They can also be obsolete
attacks (but probably harmless) traffic.
We recommend that you log such attacks.
Copyright © 2010, Juniper Networks, Inc.
By default, IDP security policy rules can be applied to any IDP device. If you desire, you
can specify that the rule applies to only specified IDP devices.
To specify that the rule only applies to specified devices, right-click the table cell and
select Select Target to display the Select Targeted Devices dialog box, where you can
select the specify devices on which the rule is to be applied.
Severity is a rating of the danger posed by the threat the rule is designed to prevent.
To specify a rule severity, right-click the table cell and select a severity.
Table 28 on page 43 describes rule severity settings.
Chapter 4: Configuring Security Policies
43

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents