Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 22

Table of Contents

Advertisement

Network and Security Manager Administration Guide
xxii
Configuring IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Defining Match For IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Configuring Source and Destination Zones for IDP Rules (Does not apply
to Standalone IDP Sensor rulebases) . . . . . . . . . . . . . . . . . . . . . . . 463
Configuring Source and Destination Address Objects for IDP Rules . . . 463
Configuring User Roles for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
Configuring Services for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Configuring Terminal IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Defining Actions For IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Configuring Attack Objects in IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
Adding IDP Attack Object Groups by Category . . . . . . . . . . . . . . . . . . . 469
Adding IDP Attack Objects by Operating System . . . . . . . . . . . . . . . . . 470
Adding IDP Attack Objects by Severity . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Adding Custom Dynamic Attack Groups . . . . . . . . . . . . . . . . . . . . . . . . 470
Configuring IP Actions in IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Choosing an IP Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Choosing a Block Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Setting Logging Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
Setting Timeout Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
Configuring Notification in IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
Setting VLAN Tags for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Setting Severity for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Setting Target Devices for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Entering Comments for IDP Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Configuring Application Policy Enforcement (APE) Rules . . . . . . . . . . . . . . . . . . 476
Adding the APE Rulebase Using the Policy Manager . . . . . . . . . . . . . . . . . . 476
Defining Matches For APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
Configuring Applications for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . 478
Configuring Source and Destination Zones for APE Rules (Does not
Apply to Standalone IDP Sensor Rulebases) . . . . . . . . . . . . . . . . . 478
Configuring User Roles for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Configuring Services for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Configuring Actions For APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Configuring IP Actions in APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Choosing an IP Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
Choosing a Block Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Setting Logging Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Setting Timeout Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Configuring Notification in APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Setting VLAN Tags for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Setting Severity for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Setting Target Security Devices for APE Rules . . . . . . . . . . . . . . . . . . . . . . . 484
Entering Comments for APE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents