CHAPTER 9
Configuring Intrusion Detection and
Prevention for SRX Series
•
Understanding Intrusion Detection and Prevention for SRX Series on page 63
•
Example: Configuring Intrusion Detection and Prevention for SRX Series on page 64
Understanding Intrusion Detection and Prevention for SRX Series
An Intrusion Detection and Prevention (IDP) policy lets you selectively enforce various
attack detection and prevention techniques on the network traffic passing through your
SRX Series. The SRX Series offer the same set of IDP signatures that are available on
Juniper Networks IDP Series Intrusion Detection and Prevention Appliances to secure
networks against attacks. The basic IDP configuration involves the following tasks:
•
Download and install the IDP license—See
“Updating Licenses for a Branch SRX Series”
•
Download and install the signature database—You must download and install the IDP
signature database. The signature databases are available as a security package on
the Juniper Networks website. This database includes attack object and attack object
groups that you can use in IDP policies to match traffic against known attacks.
•
Configure recommended policy as the IDP policy—Juniper Networks provides predefined
policy templates to use as a starting point for creating your own policies. Each template
is a set of rules of a specific rulebase type that you can copy and then update according
to your requirements.
To get started, we recommend you use the predefined policy named “Recommended”.
•
Enable a security policy for IDP inspection—For transit traffic to pass through IDP
inspection, you configure a security policy and enable IDP application services on all
traffic that you want to inspect.
SRX Series Services Gateways can be deployed in inline tap mode and sniffer mode (only
high-end SRX Series devices). The sniffer mode is not supported on branch SRX Series
devices.
Sniffer mode is supported only on the high-end SRX Series devices. You can use the
sniffer mode of IDP deployment by configuring the interfaces in promiscuous mode and
manipulating the traffic and flow setup with routing.
63
Copyright © 2016, Juniper Networks, Inc.
Summary of Contents for Junos OS
Page 6: ...Copyright 2016 Juniper Networks Inc vi Getting Started Guide for Branch SRX Series...
Page 8: ...Copyright 2016 Juniper Networks Inc viii Getting Started Guide for Branch SRX Series...
Page 10: ...Copyright 2016 Juniper Networks Inc x Getting Started Guide for Branch SRX Series...
Page 18: ...Copyright 2016 Juniper Networks Inc 2 Getting Started Guide for Branch SRX Series...
Page 20: ...Copyright 2016 Juniper Networks Inc 4 Getting Started Guide for Branch SRX Series...
Page 22: ...Copyright 2016 Juniper Networks Inc 6 Getting Started Guide for Branch SRX Series...
Page 32: ...Copyright 2016 Juniper Networks Inc 16 Getting Started Guide for Branch SRX Series...
Page 42: ...Copyright 2016 Juniper Networks Inc 26 Getting Started Guide for Branch SRX Series...
Page 44: ...Copyright 2016 Juniper Networks Inc 28 Getting Started Guide for Branch SRX Series...
Page 46: ...Copyright 2016 Juniper Networks Inc 30 Getting Started Guide for Branch SRX Series...
Page 54: ...Copyright 2016 Juniper Networks Inc 38 Getting Started Guide for Branch SRX Series...
Page 62: ...Copyright 2016 Juniper Networks Inc 46 Getting Started Guide for Branch SRX Series...
Page 78: ...Copyright 2016 Juniper Networks Inc 62 Getting Started Guide for Branch SRX Series...
Page 86: ...Copyright 2016 Juniper Networks Inc 70 Getting Started Guide for Branch SRX Series...
Page 90: ...Copyright 2016 Juniper Networks Inc 74 Getting Started Guide for Branch SRX Series...
Page 155: ...PART 5 Index Index on page 141 139 Copyright 2016 Juniper Networks Inc...
Page 156: ...Copyright 2016 Juniper Networks Inc 140 Getting Started Guide for Branch SRX Series...