Configuring Intrusion Detection and Prevention Devices Guide
Action
Related Topics
Working with Attack Groups (NSM Procedure)
64
In most cases, the predefined attack objects are the only attack objects you need to
protect your network.
The predefined attack object list in the NSM Object Manager provides the following
summary of each attack object:
Name of the attack object
Severity of the attack: critical, major, minor, warning, info
Category
Keywords
Common Vulnerabilities and Exposures database (CVE) number
Security Focus Bugtraq database number
To view predefined attack object details:
In the Object Manager, click Attack Objects > IDP Objects to display the IDP Objects
1.
dialog box.
Click either the Predefined Attacks or Predefined Attack Groups tab to view the
2.
predefined attack object list.
Double-click the table row entry for the attack object to display its details.
3.
NOTE: You cannot create, edit, or delete predefined attack objects.
Attack Objects in Intrusion Detection and Prevention Security Policies Overview on
page 61
Working with Attack Groups (NSM Procedure) on page 64
Loading J-Security-Center Updates (NSM Procedure) on page 62
Viewing Predefined Attack Objects (NSM Procedure)
NSM groups are administrative objects that facilitate configuration and monitoring tasks.
You can add attack groups or individual attack objects to IDP rulebase rules and Exempt
rulebase rules.
Creating Dynamic Groups on page 65
Creating Static Groups on page 66
Copyright © 2010, Juniper Networks, Inc.