Configuring Services for Firewall Rules
Services are application layer protocols that define how data is structured as it travels
across the network. In NSM, service objects represent the services running on your network.
In a firewall rule, you specify which services are supported by the destination address
object.
NOTE:
All services rely on a transport layer protocol to transmit data. NSM includes
services that use TCP, UDP, RPC, and ICMP transport layer protocols.
NSM comes with several service objects based on industry-standard services already
created for you. You use these predefined service objects in firewall rules to specify the
services that traffic can use to traverse your network.
TIP:
When a Policy Manager tree table view includes an address group or service group,
you can view the object (leaf member) count for the group by hovering over the group
with the mouse. This feature is also supported for polymorphic objects in the address
or service object category.
To control FTP traffic from the Engineering Server in the trust zone to the corporate Web
Server in the DMZ zone, select the FTP, HTTP, IMCP ANY, and TELNET service objects.
You can create your own service objects to use in rules using the Object Editor, such as
service objects for protocols that use nonstandard ports.
If you use a nonstandard port (8080) for your HTTP services, create an HTTP service
object on port 8080. Add this service object to your firewall rule. NSM uses the specified
service object, HTTP on port 8080, and considers all connections to TCP/8080 to be
HTTP connections.
If the service of the network traffic matches a service selected in the rule, the firewall
performs the action.
NOTE:
For firewall rules installed on a ScreenOS 5.x device, if you use a custom service
to relocate an application to a nonstandard port, you must also enable the Application
option in the Rule Options > Miscellaneous > ScreenOS 5.x devices. For details, see
“ScreenOS 5.x and Later Options” on page 453.
Defining Actions for Firewall Rules
You can specify the action that your security device performs against traffic that matches
the zones, address objects, and services specified in the firewall rule. You can set different
actions for each rule:
•
Permit—The managed device permits the traffic to pass through the firewall to its
destination address.
Copyright © 2010, Juniper Networks, Inc.
446
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...