Assigning a policy to a device links the device to that policy.
To assign an existing policy to the ISG2000 or ISG1000 device:
a. In Device Manager, right-click the ISG2000 or ISG1000 device and select
Policy >
Assign Policy
.
b. From the Security Policy Name list, select the security policy you just created.
2.
Validate the security policy (optional).
Validating a security policy can identify potential problems before you install it.
a. In the navigation tree, select
Device Manager
.
b. From the Device Manager launchpad, select
Validate > Validate IDP Policy
and
select the device. A Job Manager window displays job information and progress.
If NSM identifies a problem in the policy during policy validation, it displays
information about the problem at the bottom of the selected rulebase. For example,
if you included a non-IDP capable security device in the Install On column of an
IDP rule, policy validation displays a error message.
3.
Install the security policy.
During policy installation, NSM installs the entire security policy, including the firewall
and IDP rules, on the security devices you selected in the Install On column of each
rule.
To install a policy:
a. In the navigation tree, select
Device Manager
.
b. From the Device Manager launchpad, select
Update Device
.
c. Select the ISG2000 or ISG1000 security device.
d. Click
OK
. A Job Manager window displays job information and progress.
Reviewing IDP Logs
After you have enabled IDP on the device and installed a security policy that uses the
IDP detection and prevention functionality, IDP logs begin to appear in the NSM Log
Viewer (assuming you enabled IDP logging for each IDP rule). Depending on the attack
objects you included in the IDP rule, the IDP log entries you receive might provide details
of events such as attacks against your network, protocol anomalies, or even simple login
attempts.
To view IDP log entries:
1.
Go to the main navigation tree and expand the
Investigate
panel.
2.
Select
Log Viewer > Predefined > 3-IDP/DI
. The Log Viewer displays all IDP logs
generated by the security device.
53
Copyright © 2010, Juniper Networks, Inc.
Chapter 2: Planning Your Virtual Network
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...