Rule Execution Sequence - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
exclude known false positives or to exclude a specific source, destination, or
source/destination pair from matching an IDP rule. If traffic matches a rule in the IDP
rulebase, IDP attempts to match the traffic against the Exempt rulebase before
performing the action specified.
Backdoor Detection—This rulebase protects your network from mechanisms installed
on a host computer that facilitates unauthorized access to the system. Attackers who
have already compromised a system typically install backdoors (such as Trojans) to
make future attacks easier. When attackers send and retrieve information to and from
the backdoor program (as when typing commands), they generate interactive traffic
that IDP can detect.
NOTE: If you import an ISG2000 or ISG1000 gateway into NSM, the imported device
configuration does not include the IDP, Exempt, or Backdoor rulebases.
SYN Protector—This rulebase protects your network from SYN-floods by ensuring that
the three-way handshake is performed successfully for specified TCP traffic. If you
know that your network is vulnerable to a SYN-flood, use the SYN-Protector rulebase
to prevent it.
Traffic Anomalies—This rulebase protects your network from attacks by using traffic
flow analysis to identify attacks that occur over multiple connections and sessions
(such as scans).
Network Honeypot—This rulebase protects your network by impersonating open ports
on existing servers on your network, alerting you to attackers performing port scans
and other information-gathering activities.

Rule Execution Sequence

The rules in all rulebases combine to create a security policy. Security devices process
and execute firewall and VPN rules in the following order:
Zone rulebase
1.
Global rulebase
2.
Multicast rulebase
3.
Managed devices process and execute IDP rules in the following order:
Exempt rulebase
1.
IDP rulebase
2.
APE rulebase
3.
Backdoor rulebase
4.
SYN Protector rulebase
5.
Traffic Anomalies rulebase
6.
Network Honeypot rulebase
7.
Chapter 9: Configuring Security Policies
433

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents