Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 401

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 35: Supported Services for Service Bindings (continued)
Service
Description
rexec
Rexec
rlogin
rlogin
rsh
rsh
rtsp
rtsp
SMB
Server Message Block
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SNMPTRAP
SNMP trap
SSH
Secure Shell
SSL
Secure Sockets Layer
syslog
Syslog
Telnet
Telnet TCP protocol
TFTP
Trivial File Transfer Protocol
VNC
Virtual Network Computing
Whois
whois
YMSG
Yahoo! Messenger
Configuring Time Binding
Use Time Binding to configure the time attributes for the custom attack object. Time
attributes control how the attack object identifies attacks that repeat for a certain number
of times. By configuring the scope and count of an attack, you can detect a sequence of
the same attacks over a period of time (one minute) across sessions.
After you enable Time Binding, configure the following time attributes:
Scope—Select the scope within which the count occurs:
Source. Select this option to detect attacks from the source IP address for the
specified number of times, regardless of the destination IP address.
Destination. Select this option to detect attacks to the destination IP address for
the specified number of times, regardless of the source IP address.
Chapter 8: Configuring Objects
Default Port
TCP/513
TCP/25, UDP/25
TCP/161, UDP/161
TCP/162, UDP/162
TCP/22, UDP/22
UDP/514
TCP/23, UDP/23
351

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents