Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual page 64

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Configuring Intrusion Detection and Prevention Devices Guide
Related Topics
48
Table 30: Backdoor Rulebase Rule Properties (continued)
Option
Action
Notification
VLAN Tag
Severity
Install On
Comments
For more information, see the IDP Concepts & Examples guide.
Intrusion Detection and Prevention Devices and Security Policies Overview on page 31
Modifying IDP Rulebase Rules (NSM Procedure) on page 36
Configuring SYN Protector Rulebase Rules (NSM Procedure) on page 49
Assigning a Security Policy in an Intrusion Detection and Prevention Device (NSM
Procedure) on page 117
Function
Specifies an action of the IDP
to detect any interactive
traffic.
Allows you to create log
records with attack
information that you can view
real-time in the Log Viewer.
Specifies that you can
configure a rule to only apply
to messages in certain VLANs.
Specifies if you can override
the inherent attack severity
on a per-rule basis within the
IDP rulebase.
Specifies the security devices
or templates that receive and
use this rule.
Specifies any miscellaneous
comment about the rule's
purpose.
Your Action
Select any type of action.
Select Configure to create log
records.
Set a value by selecting any of the
following options:
Any—This rule is applied to
messages in any VLAN and to
messages without a VLAN tag.
None—This rule is applied only
to messages that do not have a
VLAN tag.
Select VLAN Tags—This rule
specifies which VLAN tags the
rule applies to.
Set the severity to Default, Info,
Warning, Minor, Major, or Critical.
NOTE: This column only appears
when you view the Security Policy
in Expanded Mode.
Select the target security device.
NOTE: You can also select
multiple security devices on which
to install the rule.
Enter any additional comments
about the rule.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents