Validating a security policy can identify potential problems before you install it.
a.
In the navigation tree, select
Device Manager
.
b.
From the Device Manager launchpad, select
Validate > Validate IDP Policy
and
select the device. A Job Manager window displays job information and progress.
If NSM identifies a problem in the policy during policy validation, it displays
information about the problem at the bottom of the selected rulebase. For
example, if you included a non-IDP capable security device in the Install On
column of an IDP rule, policy validation displays a error message.
3.
Install the security policy.
During policy installation, NSM installs the entire security policy, including the firewall
and IDP rules, on the security devices you selected in the Install On column of each
rule.
To install a policy:
a.
In the navigation tree, select
Device Manager
.
b.
From the Device Manager launchpad, select
Update Device
.
c.
Select the ISG2000 or ISG1000 security device.
d.
Click
OK
. A Job Manager window displays job information and progress.
Reviewing IDP Logs
After you have enabled IDP on the device and installed a security policy that uses the
IDP detection and prevention functionality, IDP logs begin to appear in the NSM Log
Viewer (assuming you enabled IDP logging for each IDP rule). Depending on the attack
objects you included in the IDP rule, the IDP log entries you receive might provide details
of events such as attacks against your network, protocol anomalies, or even simple login
attempts.
To view IDP log entries:
1.
Go to the main navigation tree and expand the
Investigate
panel.
2.
Select
Log Viewer > Predefined > 3-IDP/DI
. The Log Viewer displays all IDP logs
generated by the security device.
NOTE:
The DI/IDP Logs view is a predefined custom view applied to all log entries
received by NSM. To view all log entries for all devices in the selected domain without
filters, select the Log Viewer module in the main navigation tree.
We recommend you review and analyze these log entries to determine the effectiveness
of your current security policy and IDP rules. Log entries are often a valuable insight into
your network traffic. You can see where traffic is coming from, where traffic is going to,
and what malicious content (if any) the traffic contains.
53
Copyright © 2010, Juniper Networks, Inc.
Chapter 2: Planning Your Virtual Network
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...