Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1009

Table of Contents

Advertisement

attack context for custom attack object.....................354
attack direction for custom attack object..................355
attack flow for custom attack object...........................355
attack header matches for custom attack
object....................................................................................355
attack name and description for custom attack
object...................................................................................344
attack object
copying predefined.....................................................344
editing copy of predefined.......................................344
attack object database
checking version..........................................................293
managing versions......................................................294
permissions......................................................................76
updating IDP devices.................................................290
updating overview......................................................289
updating ScreenOS devices....................................292
attack object groups...........................................................363
attack objects
custom compound............................................347, 359
custom compound, adding members..................361
custom compound, attack pattern.......................361
custom compound, ordered match......................361
custom compound, scope.......................................360
custom protocol anomaly..............................347, 359
custom signature.........................................................347
custom signature attacks, attack context.........354
custom signature, attack direction.......................355
custom signature, attack flow................................355
custom signature, attack header
matches......................................................................355
custom signature, attack pattern..........................352
custom signature, attack pattern syntax............352
custom signature, false positive setting.............348
custom signature, first data packet
context........................................................................354
custom signature, first packet context...............354
custom signature, IP header matches................356
custom signature, IP protocol and type.............348
custom signature, packet context........................354
custom signature, service binding........................348
custom signature, stream 1K context..................355
custom signature, stream 256 context...............354
custom signature, stream 8K context.................355
custom signature, stream context........................354
custom signature, supported services................349
custom signature, TCP header matches.............357
custom signature, time binding..............................351
custom signature, UDP header matches...........358
Copyright © 2010, Juniper Networks, Inc.
custom, about..............................................................343
custom, extended information...............................345
custom, external references....................................345
custom, groups.............................................................363
custom, name and description..............................344
custom, target platform...........................................346
defined............................................................................835
DI profiles........................................................................337
local update..................................................................290
predefined.......................................................................337
updating.........................................................................289
using proxy............................................................292
updating predefined.........................................338, 342
viewing predefined......................................................337
attack pattern for custom attack object.....................352
attack pattern syntax..........................................................352
attack statistics...........................................................668, 677
Attacks by Severity (DI) report.........................................812
Attacks by Severity (Screen) report...............................813
Attacks over Time (DI) report...........................................812
Attacks over Time (Screen) report......................814, 829
audit log entries
filtering by cell................................................................791
migrating.........................................................................792
purging.............................................................................792
setting start time.........................................................792
Audit Log table
column information....................................................789
Audit Log Viewer
about...................................................................................27
defined............................................................................835
device updates, reviewing........................................252
using.................................................................................788
audit logs, permission to view............................................77
Audit-Log table
filtering..............................................................................791
managing.......................................................................790
selecting auditable activities..................................790
sorting..............................................................................790
authentication
configuring in firewall rules.......................................461
defined............................................................................835
NSM user..........................................................................68
authentication servers
backup servers.............................................................396
defined............................................................................836
objects.............................................................................395
RADIUS...........................................................................398
RADIUS example..........................................................401
Index
959

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents