Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 22

Table of Contents

Advertisement

Network and Security Manager Administration Guide
xxii
Configuring Terminal IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Defining Actions For IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Configuring Attack Objects in IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Adding IDP Attack Object Groups by Category . . . . . . . . . . . . . . . . . . . 465
Adding IDP Attack Objects by Operating System . . . . . . . . . . . . . . . . . 466
Adding IDP Attack Objects by Severity . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Adding Custom Dynamic Attack Groups . . . . . . . . . . . . . . . . . . . . . . . . 466
Configuring IP Actions in IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Choosing an IP Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Choosing a Block Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Setting Logging Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Setting Timeout Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Configuring Notification in IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Setting VLAN Tags for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Setting Severity for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Setting Target Devices for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Entering Comments for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Configuring Application Policy Enforcement (APE) Rules . . . . . . . . . . . . . . . . . . 472
Adding the APE Rulebase Using the Policy Manager . . . . . . . . . . . . . . . . . . . 472
Defining Matches For APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Configuring Applications for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . 474
Configuring Source and Destination Zones for APE Rules (Does not
Apply to Standalone IDP Sensor Rulebases) . . . . . . . . . . . . . . . . . 474
Configuring User Roles for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Configuring Services for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
Configuring Actions For APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Configuring IP Actions in APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Choosing an IP Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Choosing a Block Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
Setting Logging Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
Setting Timeout Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
Configuring Notification in APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
Setting VLAN Tags for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Setting Severity for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Setting Target Security Devices for APE Rules . . . . . . . . . . . . . . . . . . . . . . . 480
Entering Comments for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Configuring Exempt Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Adding the Exempt Rulebase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Defining a Match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Configuring Source and Destination Zones . . . . . . . . . . . . . . . . . . . . . . . 481
Configuring Source and Destination Address Objects . . . . . . . . . . . . . . 481
Setting Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Specifying VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Setting Target Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Entering Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Creating an Exempt Rule from the Log Viewer . . . . . . . . . . . . . . . . . . . . . . . 482
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents