Table 14: Firewall Data Elements
(continued)
Description
Data Element
Application services. Possible values:
•
None (default)
•
RWX
•
RRWX
application-services
You can use a GTP object in a firewall rule to determine how your security devices handles GTP
traffic
gtp
To detect viruses in network traffic, you can configure the rule to forward traffic to an antivirus
scanner. The server or Scan Manager returns the traffic—after it is cleaned or altered—and the
security device executes the action specified in the Action column.
av
Antispam.
anti-spam
IDP (rb_idp_collection)
The IDP (rb_idp_collection) rulebase includes IDP rules that protect your network from
attacks by using attack objects to identify malicious activity and take action. When you
create an IDP rule, you specify the type of network traffic to be monitored for attacks
including the from and to zone, source IP and destination IP for the network traffic, and
service (type of IP traffic associated with the application layer protocols supported at
the destination IP address). In security policies, service objects define the type of traffic
that a rule must monitor.
These data elements are illustrated and described in Figure 10 on page 40 and Table 15
on page 41.
39
Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Security Data Model
Содержание NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 10: ...Copyright 2010 Juniper Networks Inc x Network and Security Manager 2010 4 API Guide...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Network and Security Manager 2010 4 API Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager 2010 4 API Guide...
Страница 24: ...Copyright 2010 Juniper Networks Inc 6 Network and Security Manager 2010 4 API Guide...
Страница 34: ...Copyright 2010 Juniper Networks Inc 16 Network and Security Manager 2010 4 API Guide...
Страница 58: ...Figure 10 IDP Rulebase Copyright 2010 Juniper Networks Inc 40 Network and Security Manager 2010 4 API Guide...
Страница 92: ...Copyright 2010 Juniper Networks Inc 74 Network and Security Manager 2010 4 API Guide...
Страница 98: ...Copyright 2010 Juniper Networks Inc 80 Network and Security Manager 2010 4 API Guide...
Страница 100: ...Copyright 2010 Juniper Networks Inc 82 Network and Security Manager 2010 4 API Guide...
Страница 112: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager 2010 4 API Guide...
Страница 128: ...Copyright 2010 Juniper Networks Inc 110 Network and Security Manager 2010 4 API Guide...
Страница 138: ...Copyright 2010 Juniper Networks Inc 120 Network and Security Manager 2010 4 API Guide...
Страница 152: ...Copyright 2010 Juniper Networks Inc 134 Network and Security Manager 2010 4 API Guide...
Страница 165: ...PART 6 Index Index on page 149 147 Copyright 2010 Juniper Networks Inc...
Страница 166: ...Copyright 2010 Juniper Networks Inc 148 Network and Security Manager 2010 4 API Guide...