Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 Manual page 51

Configuring intrusion detection and prevention devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Table 18: New Policy Wizard: Page Two
Setting
Create new Policy for
Use Existing Policy
Table 19: New Policy Wizard: Pre-configuration Options
Setting
Description
Use Predefined Policy
Select this option to create a new security policy based on a predefined template.
Template
If you select this option, the wizard displays a drop-down list of predefined templates.
Select one and click Next.
Configure IDP Policy
Select this option and complete the rule properties on the next page to generate a policy with the
following features:
Empty Policy
Select this option to create an empty policy that you can later modify.
Copyright © 2010, Juniper Networks, Inc.
Description
Select this option to create a new security policy.
If you select this option, the wizard displays the following set of device types:
Firewall/VPN
Firewall/VPN with IDP
Standalone IDP
Select Standalone IDP.
Use this option to assign an existing policy to one or more IDP devices.
If you select this option, the wizard displays a drop-down list of existing policies.
Select a policy from the list.
NOTE: This procedure involves creating a new policy. For this procedure, do not select Use Existing
Policy.
On the next pages, complete pre-configuration options. Table 19 on page 35 describes
5.
your choices. Click Next to advance through the pages.
IDP rulebase
Multiple rules matching any source, any destination, and default services
Multiple rules are distinguished by the attack object severity group, action, and notification option
you configure in the next wizard page.
On the next to last page, select IDP devices for which you are designing this policy.
6.
Then click Next.
Click Finish to save the policy.
7.
The new policy appears in the security policy list. After you have created a security policy,
you can add rules to the new policy. Rules include IPv6, VPN, and also VPN link. For more
information, see the IDP Concepts & Examples guide
Chapter 4: Configuring Security Policies
35

Advertisement

Table of Contents
loading

Table of Contents