NOTE:
If you configure a J Series router to be managed in central manager mode and
you select an IDP rulebase rule and specify an IP address for the source and destination
instead of “any,” the rule policy is not be pushed to the router.
When configuring IDP in a firewall rule, consider the following:
•
The firewall action must be permit. You cannot enable IDP for traffic that the security
device denies or rejects.
•
Only traffic that is permitted by the firewall rule is passed to the IDP rulebases. The
security device does not forward denied traffic to IDP rulebases.
•
You cannot configure deep inspection (DI) for the rule; when you install the IDP license
on an ISG2000 or ISG1000 device running ScreenOS 5.0–IDP and later, DI is
automatically disabled on the device.
NOTE:
The Attack Profile Settings only apply to the DI feature on security devices.
To enable IDP in a firewall rule, right-click in the Rule Options column for the zone or
global firewall rule and select
DI Profile/Enable IDP
. The DI Profile/Enable IDP dialog
box appears (by default, IDP is disabled). Select
Enabled
to enable IDP for traffic that
matches the firewall rule, then select the mode in which you want IDP to operate:
•
In inline mode, which is the default, IDP is directly in the path of traffic on your network
and can detect and block attacks. For example, you can deploy the device with
integrated Firewall/VPN/IDP capabilities between the Internet and an enterprise LAN,
WAN, or special zones such as DMZ. This is the default mode.
•
In inline tap mode, IDP receives a copy of a packet while the original packet is forwarded
on the network. IDP examines the copy of the packet and flags any potential problems.
IDP’s inspection of packets does not affect the forwarding of the packet on the network.
About IDP Rulebases on Standalone IDP Sensors
Standalone IDP Sensors only support IDP-specific rulebases—not firewall rulebases. You
do not need to direct traffic to the IDP rulebases; all traffic passing through a standalone
IDP Sensor is automatically examined for IDP-related issues.
You must configure the Sensor directly to operate in inline or sensor mode. Refer to the
IDP Installer’s Guide for configuration procedures.
•
In inline mode, a Sensor is directly in the path of traffic on your network and can detect
and block attacks. For example, you can deploy the Sensor between the Internet and
an enterprise LAN, WAN, or special zones such as DMZ.
•
In sensor mode, a Sensor receives a copy of a packet while the original packet is
forwarded on the network. The Sensor examines the copy of the packet and flags any
potential problems. The Sensor’s inspection of packets does not affect the forwarding
of the packet on the network.
437
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...