Configuring Attack Name and Description
In the Attack Name and Description tab. enter basic information about the attack, such
as the attack object name and attack severity. You can also enter additional information,
such as a general description and keywords, which can make it easier for you to locate
and maintain the attack object as you use it in your firewall rules. Specifically, the attack
object wizard prompts you for the following:
•
Name—Enter an alphanumeric name for the object. You might want to include the
protocol the attack uses in the attack name.
•
Description—Enter important information about the attack, such as why you created
the attack object, how the attack or exploit works, and what specific systems on your
network the attack object is intended to protect. For example, you might want to include
the following information:
•
Attack type (buffer overflow, password exploit, format string attack,
denial-of-service)
•
Affected system (hardware, operating system, software application, or protocol the
attack targets)
•
Attack mechanism (how the attack works)
•
Attack lethality (the consequences of a successful attack)
You are not required to include all this information when creating a new custom
attack object, but it’s a good idea. If you ever need to edit this attack object, the
description can help you remember important information about the attack.
•
Severity—Select the severity that matches the lethality of this attack on your network.
Severity categories, in order of increasing lethality, are: info, warning, minor, major,
critical. Critical attacks are the most dangerous—typically these attacks attempt to
crash your server or gain control of your network. Informational attacks are the least
dangerous, and typically are used by network administrators to discover holes in their
own security system.
•
Category—Enter the category to which the attack object belongs.
•
Keywords—Enter descriptive words or numbers associated with the attack. Later, after
you have added the custom attack object to the database, you can search using these
keywords to quickly locate the attack.
•
Recommended—Check this check box if you want this attack object to be part of your
highest-risk set of attack objects. Later, when you add this attack object to dynamic
groups, you can specify whether only Recommended attack objects will be included.
•
Recommended Action—This field only exists in predefined attack objects. When you
use an attack object in a policy, you can specify what action the IDP device should take
when it detects the attack. However, for IDP-capable devices running IDP 4.1 and later
or ScreenOS 6.0 or later, you can tell the device to use the action recommended by
Juniper Networks for that attack.
Copyright © 2010, Juniper Networks, Inc.
340
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...