Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 21

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
About IDP Rulebases on Standalone IDP Sensors . . . . . . . . . . . . . . . . . . . . 433
Enabling IPSec Null Encryption for IDP Inspection . . . . . . . . . . . . . . . . . . . . 434
Managing Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Creating a Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Configuring Objects for Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Applying the Same Object to Multiple Rules . . . . . . . . . . . . . . . . . . . . . 435
Naming of Address Objects in a Security Policy That References Devices
Running ScreenOS or JUNOS Software . . . . . . . . . . . . . . . . . . . . . 436
Using the Policy Filter Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Filtering the Comment Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Using a Predefined IDP Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Using the Policy Creation Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Adding Rulebases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
Configuring Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
Defining Match for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Configuring Source and Destination Zones for Firewall Rules . . . . . . . . 439
Support for Any-IPv6 as a Source Address . . . . . . . . . . . . . . . . . . . . . . . 441
Configuring Services for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . 442
Defining Actions for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
Selecting Devices for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
Configuring Firewall Rule Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Enabling NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Enabling GTP for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Configuring Traffic Shaping in a Security Policy . . . . . . . . . . . . . . . . . . . 445
Enabling Logging and Counting for Firewall Rules . . . . . . . . . . . . . . . . . 447
Miscellaneous . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Configuring Web Filtering for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . 450
Configuring Authentication for Firewall Rules . . . . . . . . . . . . . . . . . . . . . 451
Configuring Antivirus for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . 452
Limiting Sessions per Policy from Source IPs . . . . . . . . . . . . . . . . . . . . . 454
Configuring the Session Close Notification Rule . . . . . . . . . . . . . . . . . . 454
Comments for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Configuring Multicast Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Configuring Source and Destination Zones . . . . . . . . . . . . . . . . . . . . . . . . . . 456
Configuring Source and Destination Groups . . . . . . . . . . . . . . . . . . . . . . . . . 456
Configuring Rule Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
Configuring Antivirus Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Configuring Antispam Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
Configuring IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
Defining Match For IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Configuring Source and Destination Zones for IDP Rules (Does not apply
to Standalone IDP Sensor rulebases) . . . . . . . . . . . . . . . . . . . . . . . 459
Configuring Source and Destination Address Objects for IDP Rules . . . 459
Configuring User Roles for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
Configuring Services for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Table of Contents
xxi

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents