•
SYN—When set, the SYN flag indicates a request for a new session.
•
FIN—When set, the final flag indicates that the packet transfer is complete and the
connection can be closed.
•
R1—This reserved bit (1 of 2) is not used.
•
R2—This reserved bit (2 of 2) is not used.
UDP Headers
For attacks that use UDP and a packet context, in the Protocol tab, select
UDP Packet
Header Fields
from TCP/UDP/ICMP Header Matches menu, then set values for the
following UDP fields:
•
Source Port—Specify an operand (none, =, !, >, <) and a decimal value for the port
number on the attacking device.
•
Destination Port—Specify an operand (none, =, !, >, <) and a decimal value for the port
number of the attack target.
•
Data Length—Specify an operand (none, =, !, >, <) and a decimal value for the number
of bytes in the data payload.
ICMP Headers
For attacks that use ICMP and a packet context, in the Protocol tab, select
ICMP Packet
Header Fields
from TCP/UDP/ICMP Header Matches menu, then set values for the
following ICMP fields:
•
ICMP Type—Specify an operand (none, =, !, >, <) and a decimal value for the primary
code that identifies the function of the request/reply.
•
ICMP Code—Specify an operand (none, =, !, >, <) and a decimal value for the secondary
code that identifies the function of the request/reply within a given type.
•
Sequence Number—Specify an operand (none, =, !, >, <) and a decimal value for the
sequence number of the packet. This number identifies the location of the request/reply
in relation to the entire sequence.
•
ICMP ID—Specify an operand (none, =, !, >, <) and a decimal value for the identification
number is a unique value used by the destination system to associate requests and
replies.
•
Data Length—Specify an operand (none, =, !, >, <) and a decimal value for the number
of bytes in the data payload.
Configuring a Protocol Anomaly Attack Object
A protocol anomaly attack object locates unknown or sophisticated attacks that violate
protocol specifications (RFCs and common RFC extensions). You cannot create new
protocol anomalies, but you can configure a custom attack object that controls how the
security device handles a predefined protocol anomaly when detected.
353
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...