To view individual predefined attack objects, select
Attack
. The Predefined Attacks tab
(default view) displays a table of predefined attack objects that represent known and
unknown attack patterns. Use the Predefined Attacks tab to quickly view details about
an attack object, such as name of the attack object, attack severity, attack category, and
attack references. To view the properties for an attack, right-click the attack and select
View
.
To locate all firewall rules that use a predefined attack object or group, right-click the
attack object and select
View Usages
.
Viewing Attack Version Information for Attack Objects
You can view details for predefined attack objects; however, not all details are applicable
to all attacks.
The Pattern field under the Detection tab in the Attack Version dialog box contains the
regular expression used to identify the attack. Juniper Networks Security Engineering
might choose to hide the exact pattern for specific attack objects. This is done to protect
the confidentiality of either the source or target of the specific attack object. In such
cases, the field displays Protected instead of the regular expression.
To view attack version information, click one of the Supported Platform links within an
attack object dialog box.
Viewing Predefined DI Attack Object Groups
To view predefined attack object groups, in Object Manager, select
Attack Objects
, then
select the Predefined Attack Groups tab. The name of each attack object group indicates
the severity, protocol, and attack type of the individual attack objects contained within.
For example, the predefined attack object group CRITICAL:DNS:ANOMALY contains
predefined protocol anomaly attack objects that detect critical Domain Name Service
(DNS) attacks.
To locate all firewall rules that use a predefined attack object or group, right-click the
attack object group and select
View Usages
.
Updating Predefined DI Attack Objects and Groups
You cannot create, edit, or delete predefined DI attack objects or groups, but you can
update the attack object database with new attack objects created by Juniper Networks.
Updates can include:
•
New descriptions or severities for existing attack objects
•
New attack objects
•
Deletion of obsolete attack objects
Creating DI Profiles
A Deep Inspection (DI) Profile object contains predefined attack object groups (created
by Juniper Networks), and your own custom attack object groups. After creating the DI
Profile, you add the Profile object in the Rule Option column of a firewall rule.
Copyright © 2010, Juniper Networks, Inc.
338
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...