Copyright © 2010, Juniper Networks, Inc.
references, names, and so on. You can include additional information, including general
descriptions and keywords that make it easier to locate and maintain an attack object
in your security policies.
NOTE: The fields that can be edited depend on the object type, compound
attack object, protocol anomaly object, and signature of the attack. The
signature can provide information about the protocol and context used to
perpetrate the attack, whether or not the attack is considered malicious,
direction and flow of the attack, signature pattern of the attack, and the
values found in the header section of the attack traffic.
Chapter 5: Security Data Model
59
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1 and is the answer not in the manual?
Questions and answers