Setting Target Devices; Setting Severity; Specifying Vlans; Entering Comments - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Setting Severity

Specifying VLANs

Setting Target Devices

Entering Comments

Installing Security Policies

Assigning a Security Policy to a Device

Copyright © 2010, Juniper Networks, Inc.
the attack. If both rules match the same attack, IDP attempts to capture 10 packets
before and after the attack.
NOTE: Packet captures are restricted to 256 packets before and after the attack.
You can override the inherent attack severity on a per-rule basis within the SYN Protector
rulebase. You can set the severity to either Default, Info, Warning, Minor, Major, or Critical.
To change the severity for a rule, right-click the Severity column of the rule and select a
severity.
You can specify that the rule be applied only to packets from particular VLANs. See
"Setting VLAN Tags for IDP Rules" on page 473 for more information.
For each rule in the rulebase, you can select the IDP-capable device that will use that
rule to detect and prevent attacks. Alternatively, you can use Device Manager to assign
policies to devices.
You can enter notations about the rule in the Comments column. Anything you enter in
the Comments column is not pushed to the target devices. To enter a comment, right-click
the Comments column and select Edit Comments. The Edit Comments dialog box
appears. You can enter up to 1024 characters in the Comments field.
After you have successfully verified your security policy, you must:
Assign the policy to your managed devices.
1.
Validate the policy.
2.
Install the policy on your managed devices.
3.
The following sections detail each step.
New devices do not have an existing or default security policy. However, when you import
a device configuration, NSM automatically imports all existing policies for the device. To
simplify policy management, you can merge these multiple device policies into a single
security policy that you install on several devices at one time. For details, see "Merging
Policies" on page 511.
Chapter 9: Configuring Security Policies
501

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents