Table 12: Backdoor Rulebase Data Elements
(continued)
Severity of the attack. Within the IDP rulebase, you can override
the ordinary attack severity on a per-rule basis. Possible
settings:
•
Default
•
Info
•
Warning
•
Minor
•
Major
•
Critical
severity
Log packets.
seslog
Specifies the security devices or templates that will receive
and use this rule. You can select multiple security devices on
which to install the rule.
target_collection
Exempt (rb_exempt_collection)
The exempt (rb_exempt_collection) rulebase works in conjunction with the IDP rulebase.
Before you create exempt rules, you must create rules in the IDP rulebase. If traffic
matches a rule in the IDP rulebase, IDP attempts to match the traffic against the rules
in the exempt rulebase before performing the specified action or creating a log record
for the event. When the IDP rulebase is deleted, the exempt rulebase is automatically
deleted. When you create an exempt rule, you must specify the source and destination
traffic to be exempted and the specific attacks that IDP will exempt.
The data elements in the exempt rulebase are illustrated and described in Figure 7 on
page 31 and Table 13 on page 31.
Copyright © 2010, Juniper Networks, Inc.
30
Network and Security Manager 2010.4 API Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 10: ...Copyright 2010 Juniper Networks Inc x Network and Security Manager 2010 4 API Guide...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Network and Security Manager 2010 4 API Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager 2010 4 API Guide...
Страница 24: ...Copyright 2010 Juniper Networks Inc 6 Network and Security Manager 2010 4 API Guide...
Страница 34: ...Copyright 2010 Juniper Networks Inc 16 Network and Security Manager 2010 4 API Guide...
Страница 58: ...Figure 10 IDP Rulebase Copyright 2010 Juniper Networks Inc 40 Network and Security Manager 2010 4 API Guide...
Страница 92: ...Copyright 2010 Juniper Networks Inc 74 Network and Security Manager 2010 4 API Guide...
Страница 98: ...Copyright 2010 Juniper Networks Inc 80 Network and Security Manager 2010 4 API Guide...
Страница 100: ...Copyright 2010 Juniper Networks Inc 82 Network and Security Manager 2010 4 API Guide...
Страница 112: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager 2010 4 API Guide...
Страница 128: ...Copyright 2010 Juniper Networks Inc 110 Network and Security Manager 2010 4 API Guide...
Страница 138: ...Copyright 2010 Juniper Networks Inc 120 Network and Security Manager 2010 4 API Guide...
Страница 152: ...Copyright 2010 Juniper Networks Inc 134 Network and Security Manager 2010 4 API Guide...
Страница 165: ...PART 6 Index Index on page 149 147 Copyright 2010 Juniper Networks Inc...
Страница 166: ...Copyright 2010 Juniper Networks Inc 148 Network and Security Manager 2010 4 API Guide...