Working with IDP Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Viewing Predefined IDP Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Viewing Predefined IDP Attack Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Viewing Attack Version Information for Attack Objects and Groups . . . . . . 338
Updating Predefined IDP Attack Objects and Groups . . . . . . . . . . . . . . . . . 338
Configuring Custom DI and IDP Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Using the Attack Object Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Copying and Editing Predefined Attack Objects to Create Custom Attack
Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Configuring Attack Name and Description . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Configuring Extended Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Configuring External References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Configuring Target Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
Creating a Signature Attack Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Configuring General Attack Properties . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Configuring Attack Detection Properties . . . . . . . . . . . . . . . . . . . . . . . . 347
Configuring Header Match Properties . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Configuring a Protocol Anomaly Attack Object . . . . . . . . . . . . . . . . . . . . . . . 353
Configuring a Compound Attack Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
Configuring General Attack Properties . . . . . . . . . . . . . . . . . . . . . . . . . . 354
Configuring Compound Attack Members . . . . . . . . . . . . . . . . . . . . . . . . 355
Configuring the Direction Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Creating Custom DI Attack Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Creating Custom IDP Attack Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Creating Static Attack Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Creating Dynamic Attack Groups (IDP Only) . . . . . . . . . . . . . . . . . . . . . . . . . 358
Updating Dynamic Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
Editing a Custom Attack Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Deleting a Custom Attack Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Unified Threat Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Creating UTM Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Creating an Antivirus Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Creating an Antispam Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Creating a Content Filtering Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Creating a URL Filtering Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Miscellaneous UTM Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Multipurpose Internet Mail Extension (MIME) Lists . . . . . . . . . . . . . . . . 366
Extension Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Command Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
URL Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
URL Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
ScreenOS Threat Management Features . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
Configuring Antivirus Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
Configuring External AV Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Configuring Internal AV Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
Configuring ICAP AV Servers and Profiles . . . . . . . . . . . . . . . . . . . . . . . . 371
Configuring ICAP AV Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
Configuring Web Filtering Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Copyright © 2010, Juniper Networks, Inc.
xviii
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...