exclude known false positives or to exclude a specific source, destination, or
source/destination pair from matching an IDP rule. If traffic matches a rule in the IDP
rulebase, IDP attempts to match the traffic against the Exempt rulebase before
performing the action specified.
•
Backdoor Detection—This rulebase protects your network from mechanisms installed
on a host computer that facilitates unauthorized access to the system. Attackers who
have already compromised a system typically install backdoors (such as Trojans) to
make future attacks easier. When attackers send and retrieve information to and from
the backdoor program (as when typing commands), they generate interactive traffic
that IDP can detect.
NOTE:
If you import an ISG2000 or ISG1000 gateway into NSM, the
imported device configuration does not include the IDP, Exempt, or
Backdoor rulebases.
•
SYN Protector—This rulebase protects your network from SYN-floods by ensuring that
the three-way handshake is performed successfully for specified TCP traffic. If you
know that your network is vulnerable to a SYN-flood, use the SYN-Protector rulebase
to prevent it.
•
Traffic Anomalies—This rulebase protects your network from attacks by using traffic
flow analysis to identify attacks that occur over multiple connections and sessions
(such as scans).
•
Network Honeypot—This rulebase protects your network by impersonating open ports
on existing servers on your network, alerting you to attackers performing port scans
and other information-gathering activities.
Rule Execution Sequence
The rules in all rulebases combine to create a security policy. Security devices process
and execute firewall and VPN rules in the following order:
1.
Zone rulebase
2.
Global rulebase
3.
Multicast rulebase
Managed devices process and execute IDP rules in the following order:
1.
Exempt rulebase
2.
IDP rulebase
3.
APE rulebase
4.
Backdoor rulebase
5.
SYN Protector rulebase
6.
Traffic Anomalies rulebase
7.
Network Honeypot rulebase
439
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...