NOTE:
IDP predefined policies are empty after an attack update. Relaunch
the GUI to reinstate the policies.
For the standalone IDP Sensor and ISG with IDP devices, these policies are a good starting
point for many common usage scenarios.
NSM includes the following security policy templates:
•
all_with_logging—Includes all attack objects and enables packet logging for all rules.
•
all_without_logging—Includes all attack objects but does not enable packet logging.
•
dmz_services—Protects a typical DMZ environment.
•
dns_server—Protects DNS services.
•
file_server—Protects file sharing services, such as SMB, NFS, FTP, and others.
•
getting_started—Contains very open rules. Useful in controlled lab environments, but
should not be deployed on heavy traffic live networks.
•
idp_default—Contains a good blend of security and performance.
•
Recommended
—Contains only the attack objects tagged as “recommended” by Juniper
Networks security team. All rules have their Actions column set to take the
recommended action for each attack object. By default, this policy is loaded onto all
new IDP Sensors when they are added to NSM with the Add Device Wizard.
•
web_server—Protects HTTP servers from remote attacks.
Each security policy template contains rules that use the default actions associated with
the attack object severity and protocol groups. You should customize these templates
to work on your network by selecting your own address objects as the Destination IP and
choosing IDP actions that reflect your security needs.
Using the Policy Creation Wizard
This wizard guides you through the policy creation process. Use the wizard to specify the
type of device the policy is for and the level of security you want. You can create a policy
containing a zone-based firewall rulebase with one any-any-deny rule and/or an IDP
rulebase. All other rulebases are optional and can be added to the policy based on need
and access control permissions.
If you are logged in as an IDP Administrator, firewall-only rulebases are not available.
The Policy Creation wizard lets you select policies for the following devices:
•
Firewall/VPN—Select this option to create a new policy containing a zone-based
firewall rulebase with one any-any-deny rule. This option has only one set.
•
Stand Alone IDP—Select this option to create a new policy containing the IDP rulebase.
•
Integrated Security Gateways/Security Routers—Select this option to create a new
policy containing a zone-based firewall rulebase with one any-any-permit IDP enabled
rule as well as the IDP rulebase.
447
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...