Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 983

Table of Contents

Advertisement

attack context for custom attack object......................351
attack direction for custom attack object...................352
attack flow for custom attack object...........................352
attack header matches for custom attack
object....................................................................................352
attack name and description for custom attack
object....................................................................................342
attack object
copying predefined......................................................341
editing copy of predefined........................................341
attack object database
checking version...........................................................291
managing versions......................................................292
permissions......................................................................76
updating IDP devices.................................................288
updating overview.......................................................287
updating ScreenOS devices...................................290
attack object groups...........................................................359
attack objects
custom compound...........................................344, 356
custom compound, adding members.................358
custom compound, attack pattern.......................357
custom compound, ordered match.....................358
custom compound, scope........................................357
custom protocol anomaly.............................344, 355
custom signature..............................................344, 345
custom signature attacks, attack context..........351
custom signature, attack direction.......................352
custom signature, attack flow................................352
custom signature, attack header
matches......................................................................352
custom signature, attack pattern.........................349
custom signature, attack pattern syntax...........350
custom signature, false positive setting.............345
custom signature, first packet context.................351
custom signature, IP header matches.................353
custom signature, IP protocol and type.............346
custom signature, line context...............................352
custom signature, packet context..........................351
custom signature, service binding........................345
custom signature, stream 256 context...............352
custom signature, stream context........................352
custom signature, supported services.................347
custom signature, TCP header matches............354
custom signature, time binding.............................349
custom signature, UDP header matches...........355
custom, about..............................................................340
custom, extended information...............................343
custom, external references....................................343
Copyright © 2010, Juniper Networks, Inc.
custom, groups............................................................359
custom, name and description..............................342
custom, target platform...........................................344
defined............................................................................809
DI profiles........................................................................335
local update..................................................................288
predefined......................................................................335
updating..........................................................................287
using proxy............................................................290
updating predefined........................................336, 340
viewing predefined......................................................335
attack pattern for custom attack object.....................349
attack pattern syntax.........................................................350
attack statistics...........................................................642, 651
Attacks by Severity (DI) report.......................................786
Attacks by Severity (Screen) report..............................787
Attacks over Time (DI) report.........................................786
Attacks over Time (Screen) report.....................788, 802
audit log entries
filtering by cell...............................................................765
migrating.........................................................................766
purging.............................................................................766
setting start time.........................................................766
Audit Log table
column information....................................................763
Audit Log Viewer
about...................................................................................27
defined............................................................................809
device updates, reviewing........................................250
using..................................................................................762
audit logs, permission to view............................................76
Audit-Log table
filtering.............................................................................765
managing........................................................................764
selecting auditable activities..................................764
sorting..............................................................................764
authentication
configuring in firewall rules.......................................451
defined............................................................................809
NSM user..........................................................................68
authentication servers
backup servers.............................................................393
defined.............................................................................810
objects.............................................................................392
RADIUS............................................................................395
RADIUS example.........................................................398
RADIUS user support.................................................396
timeout............................................................................393
types.................................................................................395
Index
933

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents