NOTE:
If you configure a J Series router to be managed in central manager
mode and you select an IDP rulebase rule and specify an IP address for the
source and destination instead of “any,” the rule policy is not be pushed to
the router.
When configuring IDP in a firewall rule, consider the following:
•
The firewall action must be permit. You cannot enable IDP for traffic that the security
device denies or rejects.
•
Only traffic that is permitted by the firewall rule is passed to the IDP rulebases. The
security device does not forward denied traffic to IDP rulebases.
•
You cannot configure deep inspection (DI) for the rule; when you install the IDP license
on an ISG2000 or ISG1000 device running ScreenOS 5.0–IDP and later, DI is
automatically disabled on the device.
NOTE:
The Attack Profile Settings only apply to the DI feature on security
devices.
To enable IDP in a firewall rule, right-click in the Rule Options column for the zone or
global firewall rule and select
DI Profile/Enable IDP
. The DI Profile/Enable IDP dialog
box appears (by default, IDP is disabled). Select
Enabled
to enable IDP for traffic that
matches the firewall rule, then select the mode in which you want IDP to operate:
•
In inline mode, which is the default, IDP is directly in the path of traffic on your network
and can detect and block attacks. For example, you can deploy the device with
integrated Firewall/VPN/IDP capabilities between the Internet and an enterprise LAN,
WAN, or special zones such as DMZ. This is the default mode.
•
In inline tap mode, IDP receives a copy of a packet while the original packet is forwarded
on the network. IDP examines the copy of the packet and flags any potential problems.
IDP’s inspection of packets does not affect the forwarding of the packet on the network.
About IDP Rulebases on Standalone IDP Sensors
Standalone IDP Sensors only support IDP-specific rulebases—not firewall rulebases. You
do not need to direct traffic to the IDP rulebases; all traffic passing through a standalone
IDP Sensor is automatically examined for IDP-related issues.
You must configure the Sensor directly to operate in inline or sensor mode. Refer to the
IDP Installer’s Guide for configuration procedures.
•
In inline mode, a Sensor is directly in the path of traffic on your network and can detect
and block attacks. For example, you can deploy the Sensor between the Internet and
an enterprise LAN, WAN, or special zones such as DMZ.
•
In sensor mode, a Sensor receives a copy of a packet while the original packet is
forwarded on the network. The Sensor examines the copy of the packet and flags any
443
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...