Working With Attack Groups (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Configuring Intrusion Detection and Prevention Devices Guide
Action
Related Topics

Working with Attack Groups (NSM Procedure)

64
In most cases, the predefined attack objects are the only attack objects you need to
protect your network.
The predefined attack object list in the NSM Object Manager provides the following
summary of each attack object:
Name of the attack object
Severity of the attack: critical, major, minor, warning, info
Category
Keywords
Common Vulnerabilities and Exposures database (CVE) number
Security Focus Bugtraq database number
To view predefined attack object details:
In the Object Manager, click Attack Objects > IDP Objects to display the IDP Objects
1.
dialog box.
Click either the Predefined Attacks or Predefined Attack Groups tab to view the
2.
predefined attack object list.
Double-click the table row entry for the attack object to display its details.
3.
NOTE: You cannot create, edit, or delete predefined attack objects.
Attack Objects in Intrusion Detection and Prevention Security Policies Overview on
page 61
Working with Attack Groups (NSM Procedure) on page 64
Loading J-Security-Center Updates (NSM Procedure) on page 62
Viewing Predefined Attack Objects (NSM Procedure)
NSM groups are administrative objects that facilitate configuration and monitoring tasks.
You can add attack groups or individual attack objects to IDP rulebase rules and Exempt
rulebase rules.
Creating Dynamic Groups on page 65
Creating Static Groups on page 66
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents