Juniper NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1 Manual page 77

Api guide
Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
references, names, and so on. You can include additional information, including general
descriptions and keywords that make it easier to locate and maintain an attack object
in your security policies.
NOTE: The fields that can be edited depend on the object type, compound
attack object, protocol anomaly object, and signature of the attack. The
signature can provide information about the protocol and context used to
perpetrate the attack, whether or not the attack is considered malicious,
direction and flow of the attack, signature pattern of the attack, and the
values found in the header section of the attack traffic.
Chapter 5: Security Data Model
59

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents