Configuring IDP-Capable Devices Overview
Although firewalls provide basic protection, they are not designed to detect all attacks.
Advanced attack methods often elude firewall detection by embedding an attack within
permitted traffic or by using attack vectors that are outside the firewall’s detection
capability.
When deployed inline in your network, Juniper Networks Intrusion Detection and Prevention
(IDP) technology can detect—and stop—attacks. Unlike IDS, IDP uses multiple methods
to detect attacks against your network and prevent attackers from gaining access and
doing damage. IDP can drop malicious packets or connections before the attacks can
enter your network. IDP is designed to reduce false positives and ensure that only actual
malicious traffic is detected and stopped. You can also deploy IDP as a passive sniffer,
similar to a traditional IDS, but with greater accuracy and manageability.
Common Criteria EAL2 Compliance
All Juniper Networks IDP Sensors meet the Common Criteria requirements for Common
Criteria EAL2. This section describes actions that are required for a security administrator
to properly secure the NSM system and NSM User Interface to be in compliance with the
Common Criteria EAL2 security target for Juniper Networks NetScreen-IDP 4.x.
The NSM system consists of the Device Server and the GUI Server; the NSM User Interface
is a client application used to access information stored in the NSM system.
Guidance for Intended Usage
The NSM system must be installed on dedicated systems. These dedicated systems
must not contain user processes that are not required to operate the NSM software.
Guidance for Personnel
The following items are also required for Common Criteria EAL2 compliance:
•
There must be one or more competent individuals assigned to manage the NSM system
and User Interface, and the security of the information that they contain.
•
The authorized administrators must not be careless, willfully negligent, or hostile and
must follow and abide by the instructions provided by the NSM documentation.
•
The NSM system and User Interface must be accessed only by authorized users.
Guidance for Physical Protection
The processing resources of the NSM system and User Interface must be located within
facilities with controlled access which prevents unauthorized physical access.
Supported IDP-Capable Devices
NSM supports IDP on standalone IDP Series Intrusion Detection and Prevention Appliances
(IDP 10, 50, 100, 200, 500, 600C, 600F, 1000, 1100C, and 1100F); as part of ISG2000
and ISG1000 security systems running ScreenOS 5.0.0-IDP1 or ScreenOS 5.4 and later;
as well as J Series, SRX Series, and MX Series devices.
45
Copyright © 2010, Juniper Networks, Inc.
Chapter 2: Planning Your Virtual Network
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...