Configuring Anti-Spoof Settings; Configuring Antispoof Settings In Intrusion Detection And Prevention Devices (Nsm Procedure); Example: Applying Antispoof To A Web Server And Database Server; Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 Manual

Configuring intrusion detection and prevention devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 7

Configuring Anti-Spoof Settings

Configuring Antispoof Settings in Intrusion Detection and Prevention Devices (NSM

Procedure)

Table 47: IDP Device Configuration: Anti-Spoof Settings
Setting
Interface Name
Logging
Alarm
Check Other Interfaces
Copyright © 2010, Juniper Networks, Inc.
Configuring Antispoof Settings in Intrusion Detection and Prevention Devices (NSM
Procedure) on page 85
Example: Applying Antispoof to a Web Server and Database Server (NSM
Procedure) on page 86
Antispoof settings are valid for standalone IDP sensors only. You can assign address
objects to specific interfaces on your sensor. You can set the sensor to log or drop any
connections that do not match the permitted address objects for that interface.
In addition, you can set the sensor to check incoming IP addresses against the permitted
address objects for other interfaces. If the sensor detects an IP address entering the
wrong interface, it can log or drop that connection.
To configure antispoof settings:
In NSM Device Manager, double-click the IDP device you want to configure antispoof
1.
settings. The device configuration editor appears.
Click Anti-Spoof Settings.
2.
Click New to display the Anti-Spoof Settings dialog box.
3.
Configure antispoof settings using Table 47 on page 85.
4.
Click OK.
5.
Description
Select a forwarding interface to configure.
Enable logging for spoofed IP address.
Enable alerts for spoofed IP addresses.
Indicate whether the device should check the status of other interfaces when determining spoofing.
85

Advertisement

Table of Contents
loading

Table of Contents