Table 35: Supported Services For Service Bindings - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
firewall rule that contains this attack object to monitor traffic on the standard service
port or ICMP ID.
RPC—The remote procedure call (RPC) protocol is used by distributed processing
applications to handle interaction between processes remotely. When a client makes
a remote procedure call to an RPC server, the server replies with a remote program;
each remote program uses a different program number. To detect attacks that use
RPC, configure the service binding as RPC and specify the RPC program ID.
Service—Most attacks use a specific service to attack your network. If you select Service
as the service binding, you must select the specific service used to perpetrate the
attack. Additionally, you are restricted to general attack contexts (packet, first packet,
stream, stream 256, or line context). To detect these attacks, configure the service
binding to match the attack service. See Table 35 on page 347.

Table 35: Supported Services for Service Bindings

Service
Description
AIM
AOL Instant Messenger
Chargen
Chargen
DHCP
Dynamic Host Configuration Protocol
Discard
Discard
DNS
Domain Name Service
Echo
Echo
Finger
Finger Information Protocol
FTP
File Transfer Protocol
Gnutella
Gnutella
Gopher
Gopher
HTTP
Hypertext Transfer Protocol
ICMP
Internet Control Message Protocol
IDENT
IDENT
IMAP
Internet Message Access Protocol
IRC
Internet Relay Chat
LDAP
Lightweight Directory Access Protocol
lpr
Line Printer spooler
Chapter 8: Configuring Objects
Default Port
TCP/19, UDP/19
TCP/9, UDP/9
TCP/53, UDP/53
TCP/7, UDP/7
TCP/79, UDP/79
TCP/21, UDP/21
TCP/80, UDP/80
TCP/113
TCP/143, UDP/143
347

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents