Network and Security Manager Administration Guide
344
you use a context binding of first packet, you must leave the attack pattern empty.
Table 34 on page 344 lists the supported protocol types.
Table 34: IP Protocol Name and Type Numbers
Protocol Name
Protocol Type Number
IGMP
2
IPIP
4
EGP
8
PUP
12
TP
29
IPV6
41
ROUTING
43
FRAGMENT
44
RSVP
46
GRE
47
ESP
50
AH
51
ICMPV6
58
NONE
59
DSTOPTS
60
MTP
92
ENCAP
98
PIM
103
COMP
108
RAW
255
ICMP, TCP, and UDP—Attacks that do not use a specific service might use a specific
protocol to attack your network. Some TCP and UDP attacks use standard ports to
enter your network and establish a connection; to detect these attack, configure the
Copyright © 2010, Juniper Networks, Inc.
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?