Summary of Contents for Juniper SECURITY THREAT RESPONSE MANAGER - APPLICATION CONFIGURATION GUIDE REV 1
Page 1
Security Threat Response Manager STRM Application Configuration Guide Release 2008.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 408-745-2000 www.juniper.net Part Number: 530-025610-01, Revision 1...
Page 2
Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
Information that alerts you to potential personal injury. Technical You can access technical documentation, technical notes, and release notes Documentation directly from the Juniper networks Support Web site at http:// www.juniper.net/support Documentation We encourage you to provide feedback, comments, and suggestions so that we Feedback can improve the documentation.
BOUT UIDE Requesting • Open a support case using the Case Management link at Support or call 1-888-314-JTAC (from the United States, http://www.juniper.net/support/ Canada, or Mexico) or 1-408-745-9500 (from elsewhere). STRM Default Application Configuration Guide...
EFINING PPLICATION APPINGS By default, STRM can classify many applications. When creating new or customized application mappings, you must: Update the Application Views in the STRM Administration interface, which Step 1 contains group and object information. For more information on updating the Applications Views, see the STRM Administration Guide.
Page 8
EFINING PPLICATION APPINGS Figure 1-1 Example of Application View You can edit the user defined mapping file to ensure specific traffic is appropriately classified in the STRM interface. However, STRM also includes default application IDs, which you can view in the Applications View of the STRM interface. For example, in Figure 1-1, the Chat group includes the default AOL group, which is...
Page 9
When adding new application identification numbers, we recommend that you • apply numbers ranging between 15,000 to 20,000. Contact Juniper Networks Customer Support for further information. The format of the entry must resemble the following: <New ID>...
EFINING PPLICATION APPINGS Note: For information on creating or editing views, see the STRM Administration Guide. From the menu, select Configurations > Deploy configuration changes. Step 8 The Deploy configuration changes window appears: Click Close. Step 9 You have successfully deployed your changes. Example of a 15000 1010 10.100.100/24,10.100.50.10:* 172.14.33.33:80,443 AllowedWebTypeA Mapping File...
Page 11
EFAULT PPLICATIONS STRM includes default application IDs, which you can view in the Applications View of the STRM interface. This chapter provides the default application values as they appear in the Applications View. The default application values apply to all source and destination flows, however, the destination port is specific to the application.
ROTOCOL This chapter provides information on default protocols IDs used in STRM. Table 4-1 lists the default common protocols: Table 4-1 Protocol ID Protocol ID Protocol Port Description ICMP IGMP IDPR-CMTP IPv6 RSVP NARP OSPFIGP IPIP SCTP STRM Default Application Configuration Guide...
Page 35
This chapter provides information on default port IDs used by STRM. Table 5-1 lists the default common ports: Table 5-1 Port ID Port Protocol Protocol Description File Transfer Protocol File Transfer Protocol Secure Shell Telnet SMTP Send Mail Transfer Protocol Domain Name Service DHCP Dynamic Host Control Protocol...
Table 5-1 Port ID (continued) Port Protocol Protocol Description 1243 SubSeven and other trojans 1433 Microsoft SQL Server 1521 Oracle SQL 2049 Network File System 3306 mySQL 4000 6000 X Windowing System 6699 Napster 6667 6776 SubSeven and other trojans 8080 HTTP 31337...
Need help?
Do you have a question about the SECURITY THREAT RESPONSE MANAGER - APPLICATION CONFIGURATION GUIDE REV 1 and is the answer not in the manual?
Questions and answers