Editing A Quality Of Service Profile; Working With Di Attack Objects; Viewing Predefined Di Attack Objects - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Editing a Quality of Service Profile

Working with DI Attack Objects

Viewing Predefined DI Attack Objects

Copyright © 2010, Juniper Networks, Inc.
Select the Delete icon (-) at the top of the screen. The
3.
opens.
Click
OK
to delete the profile.
4.
Select
Object Manager
1.
profiles.
Select a QoS profile to edit.
2.
Select the Edit icon at the top of the screen. The
3.
Edit the values of the profile.
4.
Click
OK
.
5.
Deep Inspection (DI) attack objects contain attack patterns and protocol anomalies for
known attacks and unknown attacks that attackers can use to compromise your network.
DI attack objects must be part of an attack object group, and a DI Profile object before
you can use them in a firewall rule to prevent malicious traffic from entering your network.
NOTE: Deep Inspection is supported by NS-5GT devices, the NS-HSC, and
all devices running ScreenOS 5.3 or later.
To create a Deep Inspection (DI) Profile object, you add predefined attack object groups
(created by Juniper Networks) and your own custom attack object groups to the Profile
object. After creating the DI Profile, you add the Profile object in the Rule Option column
of a firewall rule. If an attack is detected, the device generates an attack log entry that
appears in the Log Viewer.
For information about configuring Deep Inspection in a firewall rule, see "Creating DI
Profiles" on page 338.
NSM contains a database of hundreds of predefined DI attack objects designed to protect
networks from multiple attack vectors. Predefined groups contain attack objects, which
you can use in a DI Profile to match traffic against known and unknown attacks.
NOTE: NSM displays a superset of all predefined DI attack objects. Based
on the platform and ScreenOS firmware version, security devices include a
specific subset of DI attack objects. Therefore, the list of predefined DI attack
objects displayed in the NSM UI might not match the list of predefined DI
attack objects on the physical security device.
>
. The QoS profile screen opens with a list of QoS
QoS profiles
Edit QoS Profile
Chapter 8: Configuring Objects
window
Delete QoS Profile
window opens.
337

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents