Web_Server
idp-engine
13.
Activate the predefined Recommended policy as the active policy.
[edit]
user@host#
set security idp active-policy Recommended
14.
Confirm the active policy enabled on your device.
[edit]
user@host>
show security idp active-policy
active-policy Recommended;
15.
Create a security policy for the traffic from the untrust zone to the DMZ zone. In this
step, you are creating an address set in the DMZ zone to group all HTTP server
addresses together. In this example, you are applying security policies that can be
used to inspect the traffic between the untrust zone and the DMZ zone.
NOTE:
Keep in mind the following points:
•
Security policy on order on SRX Series device is important because
Junos OS performs a policy lookup starting from the top of the list,
and when the device finds a match for the traffic received, it stops
policy lookup.
•
The SRX Series device allows you to enable IDP processing on a
security policy on a rule-by-rule basis, instead of turning on IDP
inspection across the device.
•
A security policy identifies what traffic is to be sent to the IDP engine,
and then the IDP engine applies inspection based on the contents of
that traffic. Traffic that matches a security policy in which IDP is not
enabled completely bypasses IDP processing. Traffic that matches
a security policy marked for IDP processing is handed off to the IDP
engine.
[edit]
user@host#
set security zones security-zone DMZ address-book address
Server-HTTP-1 192.168.2.2/24
user@host#
set security zones security-zone DMZ address-book address
Server-HTTP-2 192.168.2.3/24
user@host#
set security zones security-zone DMZ address-book address-set
DMZ-address-set-http address Server-HTTP-1
user@host#
set security zones security-zone DMZ address-book address-set
DMZ-address-set-http address Server-HTTP-2
user@host#
set security policies from-zone untrust to-zone DMZ policy P1 match
source-address any
user@host#
set security policies from-zone untrust to-zone DMZ policy P1 match
destination-address DMZ-address-set-http
user@host#
set security policies from-zone untrust to-zone DMZ policy P1 match
application junos-http
67
Copyright © 2016, Juniper Networks, Inc.
Chapter 9: Configuring Intrusion Detection and Prevention for SRX Series
Summary of Contents for Junos OS
Page 6: ...Copyright 2016 Juniper Networks Inc vi Getting Started Guide for Branch SRX Series...
Page 8: ...Copyright 2016 Juniper Networks Inc viii Getting Started Guide for Branch SRX Series...
Page 10: ...Copyright 2016 Juniper Networks Inc x Getting Started Guide for Branch SRX Series...
Page 18: ...Copyright 2016 Juniper Networks Inc 2 Getting Started Guide for Branch SRX Series...
Page 20: ...Copyright 2016 Juniper Networks Inc 4 Getting Started Guide for Branch SRX Series...
Page 22: ...Copyright 2016 Juniper Networks Inc 6 Getting Started Guide for Branch SRX Series...
Page 32: ...Copyright 2016 Juniper Networks Inc 16 Getting Started Guide for Branch SRX Series...
Page 42: ...Copyright 2016 Juniper Networks Inc 26 Getting Started Guide for Branch SRX Series...
Page 44: ...Copyright 2016 Juniper Networks Inc 28 Getting Started Guide for Branch SRX Series...
Page 46: ...Copyright 2016 Juniper Networks Inc 30 Getting Started Guide for Branch SRX Series...
Page 54: ...Copyright 2016 Juniper Networks Inc 38 Getting Started Guide for Branch SRX Series...
Page 62: ...Copyright 2016 Juniper Networks Inc 46 Getting Started Guide for Branch SRX Series...
Page 78: ...Copyright 2016 Juniper Networks Inc 62 Getting Started Guide for Branch SRX Series...
Page 86: ...Copyright 2016 Juniper Networks Inc 70 Getting Started Guide for Branch SRX Series...
Page 90: ...Copyright 2016 Juniper Networks Inc 74 Getting Started Guide for Branch SRX Series...
Page 155: ...PART 5 Index Index on page 141 139 Copyright 2016 Juniper Networks Inc...
Page 156: ...Copyright 2016 Juniper Networks Inc 140 Getting Started Guide for Branch SRX Series...