•
Apache (two versions)
•
Microsoft IIS, version 6.0
3.
Select the
Microsoft IIS 6.0
value to find out which IP addresses are running the IIS
server. The Protocol Profiler displays the destination IP address of the service, which
is the IIS server.
4.
Patch the vulnerable IIS server by using the information supplied with the Microsoft
Security Bulletin.
Stopping Worms and Trojans
Worms and trojans often bypass firewalls and other traditional security measures to
enter a network. Because worms and trojans operate inside a network, external firewalls
might not be able to detect them.
Use the Profiler to determine when a worm or trojan entered your network, how it was
introduced, and which network components were infected. By filtering the profile data
you can identify the source and contain the attack to minimize impact, before investigating
and recovering from any damage.
Example: SQL Worm
For example, your corporate security policy does not permit SQL servers on the internal
network. However, during a regular Microsoft update, SQL applications are installed on
a network server, without your knowledge. Because you are not aware that an SQL server
is running on your network, you do not attempt to block SQL attacks at your firewall or
IDP system. Suddenly, the SQL Slammer worm attacks and infects your network.
Using the Profiler:
1.
Create a custom TCP service object to represent Microsoft SQL (default port:
TCP/1433).
2.
Restart the Profiler.
3.
Select the
Network Profiler
to quickly see the source, destination, and service of traffic
on your network.
4.
In the Service data table, select the SQL service you just created. The Network data
viewer lists all network components current running SQL servers.
5.
Take appropriate measures to secure the network, such as:
•
Apply patches.
•
Remove the components from your network.
•
Remove SQL from all components.
•
Create a rule in your security policy that drops all SQL connections between your
internal network objects.
729
Copyright © 2010, Juniper Networks, Inc.
Chapter 18: Analyzing Your Network
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...