Adding The Ape Rulebase To A Policy Using The Application Profiler - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Adding the APE Rulebase to a Policy Using the Application Profiler

Copyright © 2010, Juniper Networks, Inc.
To configure an APE rulebase and APE rules:
In the main navigation tree, select Policies. Double-click the policy name in the
1.
security policies window or click the policy name and then select the Edit icon.
Click the Add icon in the upper right corner of the Security Policy window and select
2.
Add APE Rulebase to enable the APE rulebase tab.
To configure an APE rule, click the Add icon on the left side of the Security Policy
3.
window to open a default APE rule. You can modify the rule as necessary.
Click OK.
4.
NOTE: Policy updates include custom applications on the IDP devices with application
identification support, such as the ISG Series running ScreenOS 6.3 and IDP 5.0 or later.
From the Application Profiler view, you select from traffic flows to create corresponding
APE rules in the APE rulebase. When you configure a new APE rule, the APE rulebase is
automatically created.
NOTE: If you do not have appropriate access-control permission and you attempt to
create APE rules, the wizard returns an error message stating that you do not have
access to create rulebases.
To create APE rules for a policy from the Application Profiler:
From the Investigate panel, select Security Monitor > Profiler.
1.
Select a traffic flow (row) from the Application Profiler view and right-click on a
2.
column row.
Right-click on the traffic flow row.
3.
Select Create Application Rules > For Policies.
4.
The New Application Rules dialog box is displayed.
NOTE: If an APE rulebase is not already configured, the rulebase is automatically
configured when you add an APE rule to the security policy.
Select one or more policies to which you want to add application rules, and click
5.
Next.
From the New Application Rules dialog box, configure one or more application rules.
6.
Click Next.
7.
Verify that the new rules have been correctly configured in the policy, and click Finish.
8.
Chapter 9: Configuring Security Policies
477

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents