Chapter 9 Configuring Security Policies - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

CHAPTER 9
Configuring Security Policies
Copyright © 2010, Juniper Networks, Inc.
Firewall rules define access to your network, including permitted services, users, and time
periods. You can also use firewall rules to control the shape of your network traffic as it
passes through the firewall or to log specific network events. Multicast rules permit
multicast control traffic, such as IGMP or PIM-SM messages, to cross Juniper Networks
security devices. Multicast rules permit multicast control traffic only; to permit data traffic
(both unicast and multicast) to pass between zones, you must configure firewall rules.
Because all incoming and outgoing network traffic passes through your firewall, it is the
ideal location to control the traffic flowing on your network. Creating security policies
enables you to define what type of traffic should be permitted on your network, as well
as how that traffic is treated while inside. A security policy can contain firewall rules (in
the Zone and Global rulebases), multicast rules (in the Multicast rulebase), and IDP rules
(in the Application Policy Enforcement (APE), IDP, Exempt, Backdoor Detection, SYN
Protector, Traffic Anomalies, and Network Honeypot rulebases).
This chapter contains the following sections:
About Security Policies on page 426
Creating a Security Policy on page 434
Configuring Firewall Rules on page 438
Configuring Multicast Rules on page 455
Configuring Antivirus Rules on page 457
Configuring Antispam Rules on page 458
Configuring IDP Rules on page 458
Configuring Application Policy Enforcement (APE) Rules on page 472
Configuring Exempt Rules on page 480
Configuring Backdoor Rules on page 482
Configuring SYN Protector Rules on page 487
Configuring Traffic Anomalies Rules on page 491
Configuring Network Honeypot Rules on page 495
Installing Security Policies on page 497
Managing Rules and Policies on page 503
425

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents