Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 21

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
About Firewall Rulebases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Firewall Rules (Zone and Global) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
VPN Links and Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
About Rule Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
About the Multicast Rulebase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
About IDP Rulebases on ISG Family Devices . . . . . . . . . . . . . . . . . . . . . . . . . 436
About IDP Rulebases on Standalone IDP Sensors . . . . . . . . . . . . . . . . . . . . 437
Enabling IPSec Null Encryption for IDP Inspection . . . . . . . . . . . . . . . . . . . . 438
Managing Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
Creating a Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
Configuring Objects for Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Applying the Same Object to Multiple Rules . . . . . . . . . . . . . . . . . . . . . 439
Naming of Address Objects in a Security Policy That References Devices
Running ScreenOS or Junos OS . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
Using the Policy Filter Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
Filtering the Comment Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
Using a Predefined IDP Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
Using the Policy Creation Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Adding Rulebases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
Configuring Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
Defining Match for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
Configuring Source and Destination Zones for Firewall Rules . . . . . . . . 443
Support for Any-IPv6 as a Source Address . . . . . . . . . . . . . . . . . . . . . . 445
Configuring Services for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . 446
Defining Actions for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Selecting Devices for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Configuring Firewall Rule Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Enabling NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Enabling GTP for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Configuring Traffic Shaping in a Security Policy . . . . . . . . . . . . . . . . . . . 449
Enabling Logging and Counting for Firewall Rules . . . . . . . . . . . . . . . . . 451
Miscellaneous . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Configuring Web Filtering for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . 454
Configuring Authentication for Firewall Rules . . . . . . . . . . . . . . . . . . . . 455
Configuring Antivirus for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . 456
Limiting Sessions per Policy from Source IPs . . . . . . . . . . . . . . . . . . . . . 458
Configuring the Session Close Notification Rule . . . . . . . . . . . . . . . . . . 458
Comments for Firewall Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Configuring Multicast Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Configuring Source and Destination Zones . . . . . . . . . . . . . . . . . . . . . . . . . . 460
Configuring Source and Destination Groups . . . . . . . . . . . . . . . . . . . . . . . . . 460
Configuring Rule Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
Configuring Antivirus Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Configuring Antispam Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Table of Contents
xxi

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents