NOTE:
Policy updates include custom applications on the IDP devices with
application identification support, such as the ISG Series running ScreenOS
6.3 and IDP 5.0 or later.
Adding the APE Rulebase to a Policy Using the Application Profiler
From the Application Profiler view, you select from traffic flows to create corresponding
APE rules in the APE rulebase. When you configure a new APE rule, the APE rulebase is
automatically created.
NOTE:
If you do not have appropriate access-control permission and you
attempt to create APE rules, the wizard returns an error message stating that
you do not have access to create rulebases.
To create APE rules for a policy from the Application Profiler:
1.
From the Investigate panel, select
Security Monitor
>
Profiler
.
2.
Select a traffic flow (row) from the Application Profiler view and right-click on a
column row.
3.
Right-click on the traffic flow row.
4.
Select
Create Application Rules
>
For Policies
.
The New Application Rules dialog box is displayed.
NOTE:
If an APE rulebase is not already configured, the rulebase is
automatically configured when you add an APE rule to the security policy.
5.
Select one or more policies to which you want to add application rules, and click
Next
.
6.
From the New Application Rules dialog box, configure one or more application rules.
7.
Click
Next
.
8.
Verify that the new rules have been correctly configured in the policy, and click
Finish
.
Defining Matches For APE Rules
When creating your APE rules, you must specify the type of network traffic that you want
IDP to monitor for applications.
The match columns From Zone, Source, To Zone, Destination, and Service are required
for all rules in the APE rulebase. If IDP encounters a match for the other Match columns
in an APE rule, no other rules in the rulebase are examined. .
The following sections describe the Match columns of an APE rule.
Copyright © 2010, Juniper Networks, Inc.
484
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...