PART 2
Configuring Intrusion Detection and
Prevention Devices
Copyright © 2010, Juniper Networks, Inc.
Configuring Profiler Settings on page 13
Configuring Security Policies on page 31
Working with Attack Objects on page 63
Configuring SNMP and Syslog Settings on page 81
Configuring Anti-Spoof Settings on page 85
Configuring Intrusion Detection and Prevention Device Settings on page 89
Configuring Additional Intrusion Detection and Prevention Features on page 113
11