NOTE:
If you do not have appropriate access-control permission and you attempt to
create a policy, the wizard returns an error message stating that you do not have access
to create rulebases.
In this example, you create a standalone IDP security policy that logs all levels of attack
(Critical, Major, Minor, Warning, and Info) but drops connections only for critical and
major attacks.
1.
Click
Policies
, then go to the
File
menu and select
New Policy
.
2.
Give the policy a name and add comments (optional), then click
Next
.
3.
Select
Create New Policy for
(the default selection). Uncheck
Firewall/VPN Devices
and check
Stand Alone IDP Devices
, then click
Next
.
4.
Select
Configure IDP Policy
, then click
Next
.
5.
Check the boxes and select
Enable Logging
for all attack levels. Select
Drop
Connection
for critical and major attacks. Click
Next
twice to continue.
6.
Select the device to which you want to assign this policy, then click
Next
.
7.
Click
Finish
.
Adding Rulebases
Security policies start with a minimum of rules and rulebases. You can add additional
rules to the rulebases as needed.
To add a rulebase:
1.
In the main navigation tree, select
Policies
, then double-click the policy name in the
Security Policies window.
2.
Click the Add icon in the upper right corner of the Policy window and select
Add
<name>
Rulebase
. The rulebase tab appears.
3.
Configure a rule in the rulebase by clicking the Add icon on the left side of the Security
Policy window. A default rule appears.
4.
Add a new rulebase by clicking the Add icon in the upper right corner of the Security
Policy window, then select the rulebase you want to add from the menu. You cannot
add a rulebase more than once, so only rulebases that are not already in the policy
are displayed.
The following sections explain how to configure rules in each rulebase.
Configuring Firewall Rules
The firewall rulebases enable you to create zone and global firewall rules that control
the flow of traffic on your network. You can configure the following settings for a firewall
rule:
Copyright © 2010, Juniper Networks, Inc.
442
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...