Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 284

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
266
Table 77: Configuring IDP Sensor Details (continued)
Option
Function
Severity Filter
Specifies the severity level from 1
to 5, where 1 is informational and 5
is critical.
Enable/Disable
Enables the specified IDP sensor
Sensor
entries, respectively.
Sensor Event Policies tab
Name
Specifies the rule name of the
action(s) the Secure Access device
takes when it receives attack alert
messages from an IDP sensor.
Event
Allows you to specifiy an event.
Event Count
Determines the number of times
an event must occur before action
is taken.
Action to be
Allows you to specify the action(s)
taken
the Secure Access device takes
when it receives attack alert
messages from an IDP sensor.
Your Action
Select one of the options available from
the drop–down list.
Select the Enable/Disable Sensor check
box to enable this feature.
Enter the rule name.
Select an event from the drop–down list.
Enter a number between 1 and 256 to
determine the number of times an event
must occur before action is taken.
Select one of the following options from
the drop-down list:
Ignore (just log the event)— Secure
Access device logs the event, and
takes no further action against the user
profile to which this rule applies.
Terminate user session— Secure
Access device immediately terminates
the user session and requires the user
to sign in to the Secure Access device
again.
Disable user account—Secure Access
device disables the user profile
associated with this attack alert
message, thus rendering the client
unable to sign in to the Secure Access
device until the administrator
reenables the user account. (This
option is only applicable for users who
have a local Secure Access device user
account.)
Replace user role—Specifies that the
role applied to this user's profile should
change to the role you select from the
associated drop-down list. This new
role remains assigned to the user
profile until the session terminates.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents