Configuring Application Rulebase Rules (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Configuring Application Rulebase Rules (NSM Procedure)

Table 34: APE Rulebase Rule Properties
Option
No.
Match > Source
Match > User Role
Copyright © 2010, Juniper Networks, Inc.
The Application Policy Enforcement (APE) rulebase enables you to limit bandwidth for
specified users and/or applications. You can configure APE rules to detect network traffic
based on application signatures. The APE rules are sent as part of the IDP rulebase, and
the attacks are mapped from the corresponding application. The user can define custom
application signatures to be used in the APE rules. The custom application is included
as part of the policy update for IDP 5.0 and later supported devices (devices that have
application identification support).
To configure an APE rulebase rule:
In the NSM navigation tree, select Policy Manager > Security Policies.
1.
Select and double-click the security policy to which you want to add the APE rulebase
2.
rule.
Click New in the upper right corner of the policy viewer and select Add Application
3.
Rulebase.
Click the New button within the rules viewer to add a rule.
4.
Modify the property of the rule by right-clicking the table cell for the property and
5.
making your modifications.
Configure or modify the rule using the settings described in Table 34 on page 57.
6.
Click OK to save your changes.
7.
Function
Specifies if you want to add, delete, copy,
or reorder rules.
Specifies the address object that is the
source of the traffic.
Specifies the user roles to match the
session for the rule to be applied. If a value
for User Role matches, the Source
parameter is not consulted.
Matching based on user role depends on
integration with a compatible Juniper
Networks IC Series Unified Access Control
appliance.
Chapter 4: Configuring Security Policies
Your Action
Right-click the table cell for the rule number
and make your required modifications.
Select any to monitor network traffic
originating from any IP address.
NOTE: For guidelines on specifying match
parameters, see the IDP Concepts and
Examples Guide.
Right-click the table cell to select user roles.
57

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents