Blocked Hosts
NSM can block the IP address of hosts where login attempts fail consecutively for a
specified number of times. The default value is 5 times. NSM saves a list of these blocked
IP addresses. Select
Tools > Managed Blocked Hosts
to display a list of blocked hosts
or to clear the blocked IP addresses. If the local host is blocked, you must use another
computer to use this option to unblock the host IP address.
Configuring Application Objects
You can view all application objects and create new custom application objects from
the Object Manager.
Viewing Predefined Application Objects
The
Predefined Application Objects
tab in the
Application Objects
window lists all the
predefined application objects in NSM. You can view the predefined Application objects
in a table format with the following details.
Table 31: Application Table Tab Information
Description
Field
The name of the application object.
Name
The hierarchical category to which the application belongs.
Application Category
The TCP/UDP port ranges to be matched with application signatures. Specifying a small range
improves system performance. You must configure either a TCP or UDP field; while optionally,
you can configure both.
Port Range
The type of application-predefined or custom type.
Port Binding
is required for a custom type
application while it is not required for a predefined type.
Application Type
The default TCP/UDP port bindings required for custom application types only. You must configure
either TCP or UDP or optionally, both of them.
Port Binding
An integer value used to resolve conflict when multiple application signatures are matched for a
session. In that case, the application signature with the highest order (smallest value) is taken. It
is assumed that no two signatures have the same order value, in which case the first application
signature IDP sees (not necessarily the first one in policy) is taken.
Match Order
You can double-click on an application object to view its settings which include the
following additional information:
•
Supported Platforms
•
Application signature definition (including Client-to-Server DFA and PCRE patterns
and Server-to-Client DFA and PCRE patterns)
•
Minimum data length which is the minimum number of layer-7 data bytes that the first
data packet requires to make a successful match. This applies to both Client-to-Server
and Server-to-Client packets.
Copyright © 2010, Juniper Networks, Inc.
328
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...