Security Idp Policy
Security Idp Policy
Security Idp Policy
Release
12.1
Published: 2014-06-30
ii
Table of Contents
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Documentation and Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Using the Examples in This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Merging a Full Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Merging a Snippet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Documentation Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Requesting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Self-Help Online Tools and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Opening a Case with JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Part 1
Overview
Chapter 1
Supported Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Intrusion Detection and Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
IPv6 Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Junos OS Feature Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Chapter 2
Policy Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
IDP Policies Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Understanding IDP Inline Tap Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Chapter 3
iii
Chapter 4
Chapter 5
Part 2
Configuration
Chapter 6
Policy Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Example: Enabling IDP in a Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Example: Configuring IDP Inline Tap Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Chapter 7
iv
Table of Contents
Chapter 8
Chapter 9
Chapter 10
data-length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
description (Security IDP Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
destination (Security IP Headers Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
destination-address (Security IDP Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
destination-except . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
destination-port (Security Signature Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
detect-shellcode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
direction (Security Custom Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
direction (Security Dynamic Attack Group) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
download-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
dynamic-attack-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
dynamic-attack-groups (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
enable-all-qmodules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
enable-packet-pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
expression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
false-positives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
fifo-max-size (IPS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
fifo-max-size (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
flow (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
from-zone (Security IDP Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
forwarding-process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
global (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
group-members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
hash-table-size (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
header-length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
high-availability (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
icmp (Security IDP Custom Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
icmp (Security IDP Signature Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
icmpv6 (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
identification (Security ICMP Headers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
identification (Security IP Headers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
idp-policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
idp-policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
ignore-memory-overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
ignore-reassembly-overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
ignore-regular-expression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
include-destination-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
inline-tap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
interval (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
ip-action (Security Application-Level DDoS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
ip-action (Security IDP Rulebase IPS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
ip-block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
ip-close . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
ip-connection-rate-limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
ip-flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
ip-notify . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
ips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
vi
Table of Contents
vii
regexp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
reject-timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
reset (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
reset-on-policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
rpc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
rule (Security Exempt Rulebase) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
rule (Security DDoS Rulebase) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
rule (Security IPS Rulebase) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
rulebase-ddos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
rulebase-exempt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
rulebase-ips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
scope (Security IDP Chain Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
scope (Security IDP Custom Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
security-package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
sensor-configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
sequence-number (Security IDP ICMP Headers) . . . . . . . . . . . . . . . . . . . . . . . . . 228
sequence-number (Security IDP TCP Headers) . . . . . . . . . . . . . . . . . . . . . . . . . . 228
service (Security IDP Anomaly Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
service (Security IDP Dynamic Attack Group) . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
severity (Security IDP Custom Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
severity (Security IDP Dynamic Attack Group) . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
severity (Security IDP IPS Rulebase) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
shellcode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
signature (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
source (Security IDP IP Headers) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
source-address (Security IDP Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
source-address (Security IDP Sensor Configuration) . . . . . . . . . . . . . . . . . . . . . 240
source-except . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
source-port (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
ssl-inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
start-log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
start-time (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
statistics (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
suppression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
target (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
tcp (Security IDP Protocol Binding) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
tcp (Security IDP Signature Attack) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
tcp-flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
terminal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
test (Security IDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
then (Security IDP Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
then (Security Rulebase DDos) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
time-binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
timeout (Security IDP Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
to-zone (Security IDP Policy) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
tos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
total-length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
total-memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
viii
Table of Contents
Part 3
Administration
Chapter 11
Chapter 12
Chapter 13
ix
Part 4
Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
List of Tables
About the Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Table 1: Notice Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Table 2: Text and Syntax Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Part 1
Overview
Chapter 1
Supported Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Table 3: IDP Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Table 4: IPv6 Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Table 5: Junos OS Feature Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Chapter 3
Chapter 5
Part 2
Configuration
Chapter 10
Part 3
Administration
Chapter 13
xi
Table 26: show security idp attack table Output Fields . . . . . . . . . . . . . . . . . . . . 305
Table 27: show security idp counters application-ddos Output Fields . . . . . . . . 306
Table 28: show security idp counters application-identification Output Fields . . 309
Table 29: show security idp counters dfa Output Fields . . . . . . . . . . . . . . . . . . . . 311
Table 30: show security idp counters flow Output Fields . . . . . . . . . . . . . . . . . . . 312
Table 31: show security idp counters http-decoder Output Fields . . . . . . . . . . . . 315
Table 32: show security idp counters ips Output Fields . . . . . . . . . . . . . . . . . . . . 316
Table 33: show security idp counters log Output Fields . . . . . . . . . . . . . . . . . . . . 319
Table 34: show security idp counters packet Output Fields . . . . . . . . . . . . . . . . . 322
Table 35: show security idp counters policy-manager Output Fields . . . . . . . . . 327
Table 36: show security idp counters tcp-reassembler Output Fields . . . . . . . . . 328
Table 37: show security idp logical-system policy-association Output Fields . . . 331
Table 38: show security idp memory Output Fields . . . . . . . . . . . . . . . . . . . . . . . 332
Table 39: show security idp security-package-version Output Fields . . . . . . . . . 339
Table 40: show security idp ssl-inspection key Output Fields . . . . . . . . . . . . . . . 340
Table 41: show security idp ssl-inspection session-id-cache Output Fields . . . . 341
Table 42: show security idp status Output Fields . . . . . . . . . . . . . . . . . . . . . . . . . 342
xii
To obtain the most current version of all Juniper Networks technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
If the information in the latest release notes differs from the information in the
documentation, follow the product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject
matter experts. These books go beyond the technical documentation to explore the
nuances of network architecture, deployment, and administration. The current list can
be viewed at http://www.juniper.net/books.
Supported Platforms
For the features described in this document, the following platforms are supported:
J Series
SRX Series
xiii
If the example configuration does not start at the top level of the hierarchy, the example
is a snippet. In this case, use the load merge relative command. These procedures are
described in the following sections.
From the HTML or PDF version of the manual, copy a configuration example into a
text file, save the file with a name, and copy the file to a directory on your routing
platform.
For example, copy the following configuration to a file and name the file ex-script.conf.
Copy the ex-script.conf file to the /var/tmp directory on your routing platform.
system {
scripts {
commit {
file ex-script.xsl;
}
}
}
interfaces {
fxp0 {
disable;
unit 0 {
family inet {
address 10.0.0.1/24;
}
}
}
}
2. Merge the contents of the file into your routing platform configuration by issuing the
Merging a Snippet
To merge a snippet, follow these steps:
1.
From the HTML or PDF version of the manual, copy a configuration snippet into a text
file, save the file with a name, and copy the file to a directory on your routing platform.
For example, copy the following snippet to a file and name the file
ex-script-snippet.conf. Copy the ex-script-snippet.conf file to the /var/tmp directory
on your routing platform.
commit {
file ex-script-snippet.xsl; }
2. Move to the hierarchy level that is relevant for this snippet by issuing the following
xiv
[edit]
user@host# edit system scripts
[edit system scripts]
3. Merge the contents of the file into your routing platform configuration by issuing the
For more information about the load command, see the CLI User Guide.
Documentation Conventions
Table 1 on page xv defines notice icons used in this guide.
Meaning
Description
Informational note
Caution
Warning
Laser warning
Tip
Best practice
Table 2 on page xv defines the text and syntax conventions used in this guide.
Description
Examples
xv
Description
Examples
| (pipe symbol)
broadcast | multicast
# (pound sign)
[ ] (square brackets)
; (semicolon)
[edit]
root@# set system domain-name
domain-name
[edit]
routing-options {
static {
route default {
nexthop address;
retain;
}
}
}
GUI Conventions
Bold text like this
xvi
Description
Examples
Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can
improve the documentation. You can provide feedback by using either of the following
methods:
Online feedback rating systemOn any page at the Juniper Networks Technical
Documentation site at http://www.juniper.net/techpubs/index.html, simply click the
stars to rate the content, and use the pop-up form to provide us with information about
your experience. Alternately, you can use the online feedback form at
https://www.juniper.net/cgi-bin/docbugreport/.
JTAC hours of operationThe JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
xvii
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
xviii
PART 1
Overview
CHAPTER 1
Supported Features
SRX550
SRX650
SRX1400
SRX3400
SRX3600
SRX5600
SRX5800
J Series
Yes
Yes
No
No
Yes
Yes
Yes
No
Application
identification
Yes
Yes
Yes
Yes
No
No
Yes
No
Feature
See Application
Identification (Junos
OS) for the Junos OS
version of application
identification.
Application-level DDoS
rule base
SRX550
SRX650
SRX1400
SRX3400
SRX3600
SRX5600
SRX5800
J Series
Cryptographic key
handling
No
No
Yes
No
DSCP marking
No
No
Yes
No
Yes
Yes
Yes
No
IDP class-of-service
action
No
No
Yes
No
IDP in an active/active
chassis cluster
Yes
Yes
No
No
No
Yes
No
IDP logging
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
IDP policy
Yes
Yes
Yes
Yes
No
No
Yes
No
Yes
Yes
Yes
Yes
No
No
Yes
No
Yes
Yes
Yes
Yes
Jumbo frames
Yes
Yes
Nested application
identification
(Extended application
identification)
Yes
Yes
Yes
No
Performance and
capacity tuning for IDP
No
No
Yes
No
Yes
Yes
Yes
Yes
Feature
Related
Documentation
IPv6 Support
IPv6 is the successor to IPv4. IPv6 builds upon the functionality of IPv4, providing
improvements to addressing, configuration and maintenance, and security. These
improvements include:
Improved privacy and securityIPv6 supports extensions for authentication and data
integrity, which enhance privacy and security.
Table 4 on page 5 lists the SRX Series and J Series device features that support IPv6.
Feature
SRX100
SRX110
SRX210
SRX220
SRX240
SRX550
SRX650
SRX1400
SRX3400
SRX3600
SRX5600
SRX5800
J Series
Chassis cluster
Active-active
SRX100, SRX210,
SRX220, and SRX240
only
Yes
Yes
Yes
Active-passive
SRX100, SRX210,
SRX220, and SRX240
only
Yes
Yes
Yes
Multicast flow
SRX100, SRX210,
SRX220, and SRX240
only
Yes
Yes
Yes
Yes
Yes
Yes
Yes
DS-Lite concentrator
(aka AFTR)
No
Yes
Yes
No
No
No
No
No
Feature
SRX100
SRX110
SRX210
SRX220
SRX240
SRX550
SRX650
SRX1400
SRX3400
SRX3600
SRX5600
SRX5800
J Series
Firewall filters
Yes
Yes
Yes
Yes
Forwarding option:
flow mode
Yes
Yes
Yes
Yes
Multicast flow
Yes
Yes
Yes
Yes
Screens
Yes
Yes
Yes
Yes
Security policy
(firewall)
Yes
Yes
Yes
Yes
No
No
Yes
No
No
No
No
No
Zones
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
IPv6 NAT64
Yes
Yes
Yes
Yes
IPv6related
protocols
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
IPv6 NAT
NAT-PT, NAT support
Feature
SRX100
SRX110
SRX210
SRX220
SRX240
SRX550
SRX650
SRX1400
SRX3400
SRX3600
SRX5600
SRX5800
J Series
System services
Yes
Yes
Yes
Yes
Application DDoS
(AppDoS)
No
No
No
No
Application Firewall
(AppFW)
Yes
Yes
Yes
No
Application QoS
(AppQoS)
No
No
Yes
No
Application Tracking
(AppTrack)
No
No
No
No
IDP
No
No
Yes
No
Admin operations
(Telnet, SSH, HTTPS,
and so on.)
No
No
Yes
No
Chassis clusters
No
No
Yes
No
Firewall authentication
No
No
Yes
No
Flows
No
No
Yes
No
Interfaces
No
No
Yes
No
No
No
Yes
No
No
No
Yes
No
No
No
Yes
No
Screen options
No
No
Yes
No
IPv6 IDP/AppSecure
Logical systems
Feature
Zones and security
policies
SRX100
SRX110
SRX210
SRX220
SRX240
No
SRX550
SRX650
SRX1400
SRX3400
SRX3600
SRX5600
SRX5800
J Series
No
Yes
No
Yes
Yes
Yes
Yes
Firewall filters
Yes
Yes
Yes
Yes
Forwarding option:
packet mode
Yes
Yes
No
Yes
Related
Documentation
Device
Feature
J
Series
Access Manager
BGP Route
Reflectors
SRX
110
SRX
210
SRX
220
SRX
240
SRX
550
SRX
650
Dynamic VPN
SRX
100
SRX
1000
line
SRX
3000
line
SRX
5000
line
IDP Signature
Update
X*
X*
X*
X*
Application
Signature Update
(Application
Identification)
Juniper-Kaspersky
Anti-Virus
Device
Feature
J
Series
SRX
100
SRX
110
SRX
210
SRX
220
SRX
240
SRX
550
SRX
650
Juniper-Sophos
Anti-Spam
Juniper-Websense
Integrated Web
Filtering
X*
X*
SRX
3000
line
SRX
5000
line
SRX100 Memory
Upgrade
UTM
SRX
1000
line
X*
10
CHAPTER 2
Policy Basics
Create new IDP policies starting from scratch. See Example: Defining Rules for an IDP
IPS Rulebase on page 65.
Create an IDP policy starting with one of the predefined templates provided by Juniper
Networks (see Understanding Predefined IDP Policy Templates on page 23).
11
Related
Documentation
Add or delete rules within a rulebase. You can use any of the following IDP objects to
create rules:
Create custom attack objects (see Example: Configuring IDP Signature-Based Attacks
on page 85).
Update the signature database provided by Juniper Networks. This database contains
all predefined objects.
Maintain multiple IDP policies. Any one of the policies can be applied to the device.
Junos OS Feature Support Reference for SRX Series and J Series Devices
NOTE: You must restart the device when switching to inline tap mode or
back to regular mode.
12
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
13
14
CHAPTER 3
15
Match conditions use the following characteristics to specify the type of network traffic
to be monitored:
From-zone and to-zoneAll traffic flows from a source to a destination zone. You can
select any zone for the source or destination. You can also use zone exceptions to
specify unique to and from zones for each device. Specify any to monitor network traffic
originating from and to any zone. The default value is any.
Source IP AddressSpecify the source IP address from which the network traffic
originates. You can specify any to monitor network traffic originating from any IP
address. You can also specify source-except to specify all sources except the specified
addresses. The default value is any.
is sent. You can set this to any to monitor network traffic sent to any IP address. You
can also specify destination-except to specify all destinations except the specified
addresses. The default value is any.
address. You can specify any for all applications and default for the application
configured in the attack object for the rule.
Zone Objects
A zone or security zone is a collection of one or more network interfaces. IDP uses zone
objects configured in the base system.
TCPSpecifies a TCP port or a port range to match network services for specified TCP
ports. You can specify junos-tcp-any to match services for all TCP ports.
16
UDPSpecifies a UDP port or a port range to match network services for specified
UDP ports. You can specify junos-udp-any to match services for all UDP ports.
RPCSpecifies a remote procedure call (RPC from Sun Microsystems) program number
or a program number range. IDP uses this information to identify RPC sessions.
ICMPSpecifies a type and code that is a part of an ICMP packet. You can specify
junos-icmp-all to match all ICMP services.
Attack Objects
IDP attack objects represent known and unknown attacks. IDP includes a predefined
attack object database that is periodically updated by Juniper Networks. Attack objects
are specified in rules to identify malicious activity. Each attack is defined as an attack
object, which represents a known pattern of attack. Whenever this known pattern of
attack is encountered in the monitored network traffic, the attack object is matched. The
three main types of attack objects are described in Table 6 on page 17:
Description
17
Description
Pre defined attack object groupsContain objects present in the signature database.
The Pre defined attack object groups are dynamic in nature. For example, FTP: Minor
group selects all attacks of application- FTP and severity- Minor. If a new FTP attack
of minor severity is introduced in the security database, it is added to the FTP: Minor
group by default.
18
To prevent these chain attacks from being added to the policy, configure the dynamic
group as follows:
Custom attack groupsContain customer defined attack groups and can be configured
through the CLI. They can contain specific predefined attacks, custom attacks,
predefined attack groups, or dynamic attack groups. They are static in nature, because
the attacks are specified in the group. Therefore the attack group do not change when
the security database is updated
Definition
No Action
No action is taken. Use this action when you only want to generate
logs for some traffic.
Ignore Connection
Diffserv Marking
19
Definition
Drop Packet
Drops a matching packet before it can reach its destination but does
not close the connection. Use this action to drop packets for attacks
in traffic that is prone to spoofing, such as UDP traffic. Dropping a
connection for such traffic could result in a denial of service that
prevents you from receiving traffic from a legitimate source-IP
address.
NOTE: When an IDP policy is configured using a non-packet context
defined in a custom signature for any application and has the action
drop packet, when IDP identifies an attack the decoder will promote
drop_packet to drop_connection. With a DNS protocol attack, this
is not the case. The DNS decoder will not promote drop_packet to
drop_connection when an attack is identified. This will ensure that
only DNS attack traffic will be dropped and valid DNS requests will
continue to be processed. This will also avoid TCP retransmission
for the valid TCP DNS requests..
Drop Connection
Close Client
Closes the connection and sends an RST packet to the client but
not to the server.
Close Server
Closes the connection and sends an RST packet to the server but
not to the client.
Closes the connection and sends an RST packet to both the client
and the server.
Recommended
20
Source IP address
Destination IP address
Destination port
From-zone
Protocol
Definition
Notify
Does not take any action against future traffic, but logs the event.
This is the default.
Drop/Block Session
All packets of any session matching the IP action rule are dropped
silently.
Close Session
Any new sessions matching this IP action rule are closed by sending
RST packets to the client and server.
When traffic matches multiple rules, the most severe IP action of all matched rules is
applied. The most severe IP action is the Close Session action, the next in severity is the
Drop/Block Session action, and then the Notify action.
21
Set AlertsSpecify an alert option for a rule in the IDP policy. When the rule is matched,
the corresponding log record displays an alert in the alert column of the Log Viewer.
Security administrators use alerts to become aware of and react to important security
events.
Set Severity LevelSet severity levels in logging to support better organization and
presentation of log records on the log server. You can use the default severity settings
of the selected attack objects or choose a specific severity for your rule. The severity
you configure in the rules overrides the inherited attack severity. You can set the severity
level to the following levels:
Related
Documentation
Info2
Warning3
Minor4
Major5
Critical7
Junos OS Feature Support Reference for SRX Series and J Series Devices
22
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
NOTE: The 1-gigabyte versions labeled 1G should only be used for devices
that are limited to 1 GB of memory. If a 1-GB device loads anything other than
a 1-GB policy, the device might experience policy compilation errors due to
limited memory or limited coverage. If a 2-GB device loads anything other
than a 2-GB policy, the device might experience limited coverage.
Use these templates as a guideline for creating policies. We recommend that you make
a copy of these templates and use the copy (not the original) for the policy. This approach
allows you to make changes to the policy and to avoid future issues due to changes in
the policy templates.
Table 9 on page 24 summarizes the predefined IDP policy templates provided by Juniper
Networks.
23
Description
Client-And-Server-Protection
Designed to protect both clients and servers. To be used on high memory devices with 2 GB or
more of memory.
Client-And-Server-Protection-1G
Designed to protect both clients and servers. To be used on all devices, including low-memory
branch devices.
Client-Protection
Designed to protect clients. To be used on high memory devices with 2 GB or more of memory.
Client-Protection-1G
Designed to protect clients. To be used on all devices, including low-memory branch devices.
DMZ Services
DNS Server
File Server
Protects file sharing services, such as Network File System (NFS), FTP, and others.
Getting Started
Contains very open rules. Useful in controlled lab environments, but should not be deployed on
heavy traffic live networks.
IDP Default
Recommended
Contains only the attack objects tagged as recommended by Juniper Networks. All rules have
their Actions column set to take the recommended action for each attack object.
Server-Protection
Designed to protect servers. To be used on high memory devices with 2 GB or more of memory.
Server-Protection-1G
Designed to protect servers. To be used on all devices, including low-memory branch devices.
Web Server
take a few minutes. Even after a commit complete message is displayed in the CLI,
the system might continue to compile and push the policy to the dataplane.
24
6. Delete or deactivate the commit script file. By deleting the commit script file, you
avoid the risk of overwriting modifications to the template when you commit the
configuration. Deactivating the statement adds an inactive tag to the statement,
effectively commenting out the statement from the configuration. Statements marked
inactive do not take effect when you issue the commit command.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Definition
Match condition
Specify the network traffic you want the device to monitor for attacks.
Action
IP Action
25
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
26
Term
Definition
Match condition
Specify the type of network traffic you want the device to monitor
for attacks. For more information about match conditions, see
Understanding IDP Policy Rules on page 15.
Attack objects/groups
Specify the attacks you want the device to match in the monitored
network traffic. Each attack is defined as an attack object, which
represents a known pattern of attack. For more information about
attack objects, see Understanding IDP Policy Rules on page 15.
Terminal flag
Specify a terminal rule. The device stops matching rules for a session
when a terminal rule is matched. For more information about terminal
rules, see Understanding IDP Terminal Rules on page 28.
Action
Specify the action you want the system to take when the monitored
traffic matches the attack objects specified in the rules. If an attack
triggers multiple rule actions, then the most severe action among
those rules is executed. For more information about actions, see
Understanding IDP Policy Rules on page 15.
IP Action
Notification
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
When an IDP rule uses an attack object group that contains one or more attack objects
that produce false positives or irrelevant log records.
NOTE: Make sure to configure the IPS rulebase before configuring the exempt
rulebase.
Table 12 on page 27 summarizes the options that you can configure in the exempt-rulebase
rules.
Related
Documentation
Term
Definition
Match condition
Specify the type of network traffic you want the device to monitor
for attacks in the same way as in the IPS rulebase. However, in the
exempt rulebase, you cannot configure an application; it is always
set to any.
Attack objects/groups
Specify the attack objects that you do not want the device to match
in the monitored network traffic.
Junos OS Feature Support Reference for SRX Series and J Series Devices
27
To set different actions for different attacks for the same Source and Destination.
To disregard traffic that originates from a known trusted source. Typically, the action
is None for this type of terminal rule.
To disregard traffic sent to a server that is vulnerable only to a specific set of attacks.
Typically, the action is Drop Connection for this type of terminal rule.
Use caution when defining terminal rules. An inappropriate terminal rule can leave your
network open to attacks. Remember that traffic matching the source, destination, and
application of a terminal rule is not compared to subsequent rules, even if the traffic does
not match an attack object in the terminal rule. Use a terminal rule only when you want
to examine a certain type of traffic for one specific set of attack objects. Be particularly
careful about terminal rules that use any for both the source and destination. Terminal
rules should appear near the top of the rulebase before other rules that would match
the same traffic.
Related
Documentation
28
Junos OS Feature Support Reference for SRX Series and J Series Devices
Junos OS Feature Support Reference for SRX Series and J Series Devices
29
30
CHAPTER 4
Junos OS Feature Support Reference for SRX Series and J Series Devices
31
32
CHAPTER 5
Severity on page 34
33
Attack Name
Specify an alphanumeric name for the object. You might want to include the protocol
the attack uses in the attack name.
Severity
Specifies the brutality of the attack on your network. Severity categories, in order of
increasing brutality, are info, warning, minor, major, critical (see Understanding IDP Policy
Rules on page 15). Critical attacks are the most dangeroustypically these attacks
attempt to crash your server or gain control of your network. Informational attacks are
the least dangerous, and typically are used by network administrators to discover holes
in their own security systems.
NOTE: Specify either the service or the protocol binding in a custom attack.
In case you specify both, the service binding takes precedence.
AnySpecify any if you are unsure of the correct service and want to match the signature
in all services. Because some attacks use multiple services to attack your network, you
might want to select the Any service binding to detect the attack regardless of which
service the attack chooses for a connection.
ServiceMost attacks use a specific service to attack your network. You can select
the specific service used to perpetrate the attack as the service binding.
Table 13 on page 34 displays supported services and default ports associated with the
services.
34
Service
Description
Default Port
AIM
TCP/5190
BGP
TCP/179
Chargen
TCP/19, UDP/19
Description
Default Port
DHCP
UDP/67, UDP/68
Discard
TCP/9, UDP/9
DNS
TCP/53, UDP/53
Echo
Echo
TCP/7, UDP/7
Finger
TCP/79, UDP/79
FTP
TCP/21, UDP/21
Gnutella
TCP/6346
Gopher
TCP/70
H225RAS
UDP/1718, UDP/1719
HTTP
TCP/80, TCP/81,
TCP/88, TCP/3128,
TCP/7001 (Weblogic),
TCP/8000, TCP/8001,
TCP/8100 (JRun),
TCP/8200 (JRun),
TCP/8080, TCP/8888
(Oracle-9i), TCP/9080
(Websphere), UDP/80
ICMP
IDENT
TCP/113
IKE
UDP/500
IMAP
TCP/143, UDP/143
IRC
TCP/6667
35
36
Service
Description
Default Port
LDAP
TCP/389
lpr
TCP/515
MSN
TCP/1863
MSRPC
TCP/135, UDP/135
MSSQL
TCP/1433, TCP/3306
MYSQL
TCP/3306
NBDS
UDP/137 (NBName),
UDP/138 (NBDS)
NFS
TCP/2049, UDP/2049
nntp
TCP/119
NTP
UDP/123
POP3
UDP/110, TCP/110
Portmapper
TCP/111, UDP/111
RADIUS
UDP/1812, UDP/1813
rexec
Rexec
TCP/512
rlogin
TCP/513
rsh
TCP/514
Description
Default Port
rtsp
TCP/554
SIP
TCP/5060, UDP/5060
SMB
TCP/139, TCP/445
SMTP
TCP/25, UDP/25
SNMP
TCP/161, UDP/161
SNMPTRAP
SNMP trap
TCP/162, UDP/162
SQLMON
UDP/1434
SSH
TCP/22, UDP/22
SSL
TCP/443, TCP/80
syslog
UDP/514
Telnet
TCP/23, UDP/23
TNS
TCP/1521, TCP/1522,
TCP/1523, TCP/1524,
TCP/1525, TCP/1526,
TCP/1527, TCP/1528,
TCP/1529, TCP/1530,
TCP/2481, TCP/1810,
TCP/7778
TFTP
UDP/69
VNC
TCP/5800, TCP/5900
Whois
TCP/43
37
Description
Default Port
YMSG
TCP/5050
NOTE: Specify either the service or the protocol binding in a custom attack.
In case you specify both, the service binding takes precedence.
IPYou can specify any of the supported network layer protocols using protocol
numbers. Table 14 on page 38 lists protocol numbers for different protocols.
38
Protocol Name
Protocol Number
IGMP
IP-IP
EGP
PUP
12
TP
29
IPV6
41
ROUTING
43
FRAGMENT
44
RSVP
46
GRE
47
ESP
50
AH
51
ICMPV6
58
NONE
59
Protocol Number
DSTOPTS
60
MTP
92
ENCAP
98
PIM
103
COMP
108
RAW
255
ICMP, TCP, and UDPAttacks that do not use a specific service might use specific
ports to attack your network. Some TCP and UDP attacks use standard ports to enter
your network and establish a connection.
Protocol Number
Description
ICMP
<Port>ICMP</Port>
IP
<Port>IP/protocol-number</Port>
RPC
<Port>RPC/program-number</Port>
TCP or UDP
<Port>TCP </Port>
<Port>TCP/port </Port>
<Port>TCP/minport-maxport
</Port>
<Port>UDP</Port>
<Port>UDP/10</Port>
<Port>UDP/10-100</Port>
Time Bindings
Use time bindings to configure the time attributes for the custom attack object. Time
attributes control how the attack object identifies attacks that repeat for a certain number
39
of times. By configuring the scope and count of an attack, you can detect a sequence of
the same attacks over a period of time (one minute) across sessions.
Scope
Specify the scope within which the count of an attack occurs:
SourceSpecify this option to detect attacks from the source address for the specified
number of times, regardless of the destination address. This means that for a given
attack, a threshold value is maintained for each attack from the source address. The
destination address is ignored. For example, anomalies are detected from two different
pairs (ip-a, ip-b) and (ip-a, ip-c) that have the same source address ip-a but different
destination addresses ip-b and ip-c. Then the number of matches for ip-a increments
to 2. Suppose the threshold value or count is also set to 2, then the signature triggers
the attack event.
DestinationSpecify this option to detect attacks sent to the destination address for
the specified number of times, regardless of the source address. This means that for
a given attack, a threshold value is maintained for each attack from the destination
address. The source address is ignored. For example, if anomalies are detected from
two different pairs (ip-a, ip-b) and (ip-c, ip-b) that have the same destination address
ip-b but different source addresses ip-a and ip-c. Then the number of matches for ip-b
increments to 2. Suppose the threshold value or count is also set to 2, then the signature
triggers the attack event.
PeerSpecify this option to detect attacks between source and destination IP addresses
of the sessions for the specified number of times. This means that the threshold value
is applicable for a pair of source and destination addresses. Suppose anomalies are
detected from two different source and destination pairs (ip-a, ip-b) and (ip-a, ip-c).
Then the number of matches for each pair is set to 1, even though both pairs have a
common source address.
Count
Count or threshold value specifies the number of times that the attack object must detect
an attack within the specified scope before the device considers the attack object to
match the attack. If you bind the attack object to multiple ports and the attack object
detects that attack on different ports, each attack on each port is counted as a separate
occurrence. For example, when the attack object detects an attack on TCP/80 and then
on TCP/8080, the count is two.
Once the count match is reached, each attack that matches the criteria causes the attack
count to increase by one. This count cycle lasts for a duration of 60 seconds, after which
the cycle repeats.
40
NOTE: Attack context, flow type, and direction are mandatory fields for the
signature attack definition.
Attack Context
An attack context defines the location of the signature. If you know the service and the
specific service context, specify that service and then specify the appropriate service
contexts. If you know the service, but are unsure of the specific service context, specify
one of the following general contexts:
first-data-packetSpecify this context to detect the attack in only the first data packet.
first-packetSpecify this context to detect the attack in only the first packet of a
stream. When the flow direction for the attack object is set to any, the device checks
the first packet of both the server-to-client and the client-to-server flows. If you know
that the attack signature appears in the first packet of a session, choosing first packet
instead of packet reduces the amount of traffic the device needs to monitor, which
improves performance.
packetSpecify this context to match the attack pattern within a packet. When you
select this option, you must also specify the service binding to define the service header
options . Although not required, specifying these additional parameters improves the
accuracy of the attack object and thereby improves performance.
lineSpecify this context to detect a pattern match within a specific line within your
network traffic.
stream. The normalized stream is one of the multiple ways of sending information. In
this stream the information in the packet is normalized before a match is performed.
Suppose www.yahoo.com/sports is the same as www.yahoo.com/s%70orts. The
normalized form to represent both of these URLs might be www.yahoo.com/sports.
Choose normalized stream instead of stream, unless you want to detect some pattern
in its exact form. For example, if you want to detect the exact pattern
www.yahoo.com/s%70orts, then select stream.
normalized-stream256Specify this context to detect the attack in only the first 256
normalized-stream1kSpecify this context to detect the attack in only the first 1024
normalized-stream-8kSpecify this context to detect the attack in only the first 8192
streamSpecify this context to reassemble packets and extract the data to search for
a pattern match. However, the device cannot recognize packet boundaries for stream
contexts, so data for multiple packets is combined. Specify this option only when no
other context option contains the attack.
stream256Specify this context to reassemble packets and search for a pattern match
within the first 256 bytes of a traffic stream. When the flow direction is set to any, the
41
device checks the first 256 bytes of both the server-to-client and client-to-server flows.
If you know that the attack signature will appear in the first 256 bytes of a session,
choosing stream256 instead of stream reduces the amount of traffic that the device
must monitor and cache, thereby improving performance.
stream1kSpecify this context to reassemble packets and search for a pattern match
within the first 1024 bytes of a traffic stream. When the flow direction is set to any, the
device checks the first 1024 bytes of both the server-to-client and client-to-server
flows. If you know that the attack signature will appear in the first 1024 bytes of a
session, choosing stream1024 instead of stream reduces the amount of traffic that the
device must monitor and cache, thereby improving performance.
stream8kSpecify this context to reassemble packets and search for a pattern match
within the first 8192 bytes of a traffic stream. When the flow direction is set to any, the
device checks the first 8192 bytes of both the server-to-client and client-to-server
flows. If you know that the attack signature will appear in the first 8192 bytes of a
session, choosing stream8192 instead of stream reduces the amount of traffic that the
device must monitor and cache, thereby improving performance.
Attack Direction
You can specify the connection direction of the attack. Using a single direction (instead
of Any) improves performance, reduces false positives, and increases detection accuracy.
Attack Pattern
Attack patterns are signatures of the attacks you want to detect. A signature is a pattern
that always exists within an attack; if the attack is present, so is the signature. To create
the attack pattern, you must first analyze the attack to detect a pattern (such as a
segment of code, a URL, or a value in a packet header), then create a syntactical
expression that represents that pattern. You can also negate a pattern. Negating a pattern
means that the attack is considered matched if the pattern defined in the attack does
not match the specified pattern.
NOTE: Pattern negation is supported for packet, line, and application based
contexts only and not for stream and normalized stream contexts.
Protocol-Specific Parameters
Specifies certain values and options existing within packet headers. These parameters
are different for different protocols. In a custom attack definition, you can specify fields
for only one of the following protocolsTCP, UDP, or ICMP. Although, you can define IP
protocol fields with TCP or UDP in a custom attack definition.
42
NOTE: Header parameters can be defined only for attack objects that use a
packet or first packet context. If you specified a line, stream, stream 256, or
a service context you cannot specify header parameters.
If you are unsure of the options or flag settings for the malicious packet, leave all fields
blank and Intrusion Detection and Prevention (IDP) attempts to match the signature for
all header contents.
Table 16 on page 43 displays fields and flags that you can set for attacks that use the IP
protocol.
Description
Type of Service
Specify a value for the service type. Common service types are:
0000 Default
Total Length
ID
Time to Live
Protocol
Source
Destination
Reserved Bit
More Fragments
When set (1), this option indicates that the packet contains more
fragments. When unset (0), it indicates that no more fragments
remain.
Dont Fragment
When set (1), this option indicates that the packet cannot be
fragmented for transmission.
43
Table 17 on page 44 displays packet header fields and flags that you can set for attacks
that use the TCP protocol.
44
Field
Description
Source Port
Destination Port
Sequence Number
ACK Number
Specify a value for the ACK number of the packet. This number
identifies the next sequence number; the ACK flag must be set
to activate this field.
Header Length
Data Length
Specify a value for the number of bytes in the data payload. For
SYN, ACK, and FIN packets, this field should be empty.
Window Size
Specify a value for the number of bytes in the TCP window size.
Urgent Pointer
Specify a value for the urgent pointer. The value indicates that
the data in the packet is urgent; the URG flag must be set to
activate this field.
URG
When set, the urgent flag indicates that the packet data is urgent.
ACK
PSH
When set, the push flag indicates that the receiver should push
all data in the current sequence to the destination application
(identified by the port number) without waiting for the remaining
packets in the sequence.
RST
When set, the reset flag resets the TCP connection, discarding
all packets in an existing sequence.
SYN
When set, the SYN flag indicates a request for a new session.
FIN
When set, the final flag indicates that the packet transfer is
complete and the connection can be closed.
R1
R2
Table 18 on page 45 displays packet header fields and flags that you can set for attacks
that use the UDP protocol.
Description
Source Port
Destination Port
Data Length
Table 19 on page 45 displays packet header fields and flags that you can set for attacks
that use the ICMP protocol.
Description
ICMP Type
Specify a value for the primary code that identifies the function
of the request or reply packet.
ICMP Code
Specify a value for the secondary code that identifies the function
of the request or reply packet within a given type.
Sequence Number
ICMP ID
Data Length
45
<Match>==</Match><Value>128</Value></Field>
</Protocol><Name>tcp</Name>
<Field><Name><Match><</Match>
<value>1500</Value>
</Field></Protocol></Headers>
</Attack></Attacks>
</Entry>
The following properties are specific to protocol anomaly attacks. Both attack direction
and test condition are mandatory fields for configuring anomaly attack definitions.
Attack Direction
Attack direction allows you to specify the connection direction of an attack. Using a single
direction (instead of Any) improves performance, reduces false positives, and increases
detection accuracy:
Test Condition
Test condition is a condition to be matched for an anomaly attack. Juniper Networks
supports certain predefined test conditions. In the following example, the condition is a
message that is too long. If the size of the message is longer than the preconfigured value
for this test condition, the attack is matched.
<Attacks>
<Attack>
<Type>anomaly</Type>
...
<Test>MESSAGE_TOO_LONG</Test>
<Value>yes</Value>
...
</Attack>
</Attacks>
46
<Entry>
<Name>sample-anomaly</Name>
<Severity>Info</Severity>
<Attacks><Attack>
<TimeBinding><Count>2</Count>
<Scope>peer</Scope></TimeBinding>
<Application>TCP</Application>
<Type>anomaly</Type>
<Test>OPTIONS_UNSUPPORTED</Test>
<Direction>any</Direction>
</Attack></Attacks>
</Entry>
Scope
Scope allows you to specify if the attack is matched within a session or across transactions
in a session. If the specified service supports multiple transactions within a single session,
you can also specify whether the match should occur over a single session or can be
made across multiple transactions within a session:
Specify session to allow multiple matches for the object within the same session.
Specify transaction to match the object across multiple transactions that occur within
the same session.
Order
Use ordered match to create a compound attack object that must match each member
signature or protocol anomaly in the order you specify. If you do not specify an ordered
match, the compound attack object still must match all members, but the attack pattern
or protocol anomalies can appear in the attack in random order.
Reset
Specifies that a new log is generated each time an attack is detected within the same
session. If this field is set to no then the attack is logged only once for a session.
47
orIf either of the member name patterns match, the expression matches.
andIf both of the member name patterns match, the expression matches. It does
oand (ordered and)If both of the member name patterns match, and if they appear
in the same order as specified in the boolean expression, the expression matches.
Suppose you have created five signature members, labelled s1-s5. Suppose you know
that the attack always contains the pattern s1, followed by either s2 or s3. You also know
that the attack always contains s4 and s5, but their positions in the attack can vary. In
this case, you might create the following boolean expression: ((s1 oand s2) or (s1 oand
s3)) and (s4 and s5)
NOTE: You can either define an ordered match or an expression (not both)
in a custom attack definition.
Member Index
Member Index is specified in chain attacks to identify a member (attack) uniquely. In the
following example, member index is used to identify the members m01 and m02 in the
defined expression:
<Expression>m02 AND m01</Expression>
<Order>no</Order>
<Reset>no</Reset>
<ScopeOption/>
<Members>
<Attack>
<Member>m01</Member>
<Type>Signature</Type>
...
<Pattern><!CDATA[.*/getlatestversion]]></Pattern>
<Regex/>
</Attack>
<Attack><Member>m02</Member>
<Type>Signature</Type>
...
<Pattern><!CDATA[\[Skype\'.*]]></Pattern>
<Regex/>
</Attack>
<Attack>
48
NOTE: When defining the expression, you must specify the member index
for all members.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
49
When protocol contextual information is available, protocol decoders check for attacks
within those contexts. For example, for SMTP, if an e-mail is sent to user@company.com,
user@company.com is the contextual information and SMTP MAIL TO is the context. By
using protocol contextual data, rather than the entire packet, for attack detection, protocol
decoders improve overall performance and accuracy.
If there is a policy configured with a rule that matches the protocol decoder check for
SMTP, the rule triggers and the appropriate action is taken.
The IDP module ships with a preconfigured set of protocol decoders. These protocol
decoders have default settings for various protocol-specific contextual checks they
perform. You can use these defaults or you can tune them to meet your sites specific
needs. To display the list of available protocol decoders, enter the following command:
user@host # show security idp sensor-configuration detector protocol-name ?
For a more detailed view of the current set of protocol decoders and their default context
values, you can view the detector-capabilities.xml file located in the
/var/db/idpd/sec-download folder on the device. When you download a new security
package, you also receive this file which lists current protocols and default decoder
context values.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
50
is loaded along with the new policy. In this case, each loaded policy will then use its own
associated detector for attack detection.
Note that a maximum of two detectors can be loaded at any given time. If two detectors
are already loaded (by two or more policies), and loading a new policy requires also
loading a new detector, then at least one of the loaded detectors must be unloaded
before the new detector can be loaded. Before a detector is unloaded, all policies that
use the corresponding detector are unloaded as well.
You can view the current policy and corresponding detector version by entering the
following command:
user@host> show security idp status
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Some attacks are introduced through compressed content. When the content is
decompressed, it can inflate to a very large size taking up valuable system resources
resulting in denial of service. This type of attack can be recognized by the ratio of
decompressed data size to compressed data size. The
content-decompress-ratio-over-limit counter identifies the number of incidents where
this ratio has been exceeded. The default ratio is considered consistent with a typical
environment. In some cases, however, this ratio might need to be adjusted by resetting
the content-decompress-ratio-over-limit value. Keep in mind, however, that a higher ratio
lessens the chance of detecting this type of attack.
The content-decompress-memory-over-limit counter identifies the number of incidents
where the amount of decompressed data exceeded the allocated memory. The default
memory allocation provides 33 KB per session for an average number of sessions requiring
decompression at the same time. To determine if this value is consistent with your
environment, analyze values from decompression-related counters and the total number
of IDP sessions traversing the device, and estimate the number of sessions requiring
decompression at the same time. Assuming that each of these sessions requires 33 KB
51
of memory for decompression, compare your estimated needs to the default value. If
necessary, you can adjust the memory allocation by resetting the
content-decompression-max-memory-kb value. Note that because content decompression
requires a significant allocation of memory, system performance will be impacted by
increasing the maximum memory allocation for decompression.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
52
Attack context and direction are mandatory fields for the signature attack definition.
Pattern negation is supported for packet, line, and application-based contexts only
and not for stream and normalized stream contexts.
When configuring the protocol-specific parameters, you can specify fields for only one
of the following protocolsIP, TCP, UDP, or ICMP.
When configuring a protocol binding, you can specify only one of the followingIP,
ICMP, TCP, UDP, RPC or applications.
TCP and UDPYou can specify either a single port (minimum-port) or a port range
(minimum-port and maximum-port). If you do not specify a port, the default value
is taken (0-65535).
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Attack direction
Test condition
Related
Documentation
The service or application binding is a mandatory field for protocol anomaly attacks.
Besides the supported applications, services also include IP, TCP, UDP, ICMP, and RPC.
The attack direction and test condition properties are mandatory fields for configuring
anomaly attack definitions.
Junos OS Feature Support Reference for SRX Series and J Series Devices
53
54
PART 2
Configuration
55
56
CHAPTER 6
Policy Basics
Requirements on page 57
Overview on page 57
Configuration on page 58
Verification on page 59
Requirements
Before you begin:
Configure network interfaces. See the Junos OS Interfaces Configuration Guide for
Security Devices.
Overview
For transit traffic to pass through IDP inspection, you configure a security policy and
enable IDP application services on all traffic that you want to inspect. Security policies
contain rules defining the types of traffic permitted on the network and the way that the
traffic is treated inside the network. Enabling IDP in a security policy directs traffic that
matches the specified criteria to be checked against the IDP rulebases.
57
To allow transit traffic to pass through without IDP inspection, specify a permit action
for the rule without enabling the IDP application services. Traffic matching the conditions
in this rule passes through the device without IDP inspection.
This example shows how to configure two policies, idp-app-policy-1 and idp-app-policy-2,
to enable IDP services on all traffic flowing in both directions on the device. The
idp-app-policy-1 policy directs all traffic flowing from previously configured Zone1 to
Zone2 to be checked against IDP rulebases. The idp-app-policy-2 policy directs all traffic
flowing from Zone2 to Zone1 to be checked against IDP rulebases.
NOTE: The action set in the security policy action must be permit. You cannot
enable IDP for traffic that the device denies or rejects.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set security policies from-zone Zone1 to-zone Zone2 policy idp-app-policy-1 match
source-address any destination-address any application any
set security policies from-zone Zone1 to-zone Zone2 policy idp-app-policy-1 then permit
application-services idp
set security policies from-zone Zone2 to-zone Zone1 policy idp-app-policy-2 match
source-address any destination-address any application any
set security policies from-zone Zone2 to-zone Zone1 policy idp-app-policy-2 then permit
application-services idp
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To enable IDP services on all traffic flowing in both directions on the device:
1.
2.
Specify the action to be taken on traffic that matches conditions specified in the
policy.
[edit security policies from-zone Zone1 to-zone Zone2 policy idp-app-policy-1]
user@host# set then permit application-services idp
3.
Create another security policy for the traffic flowing in the other direction.
[edit security policies from-zone Zone2 to-zone Zone1 policy idp-app-policy-2]
user@host# set match source-address any destination-address any application
any
58
4.
Specify the action to be taken on traffic that matches the conditions specified in
the policy.
[edit security policies from-zone Zone2 to-zone Zone1 policy idp-app-policy-2]
user@host# set then permit application-services idp
Results
From configuration mode, confirm your configuration by entering the show security policies
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security policies
from-zone Zone1 to-zone Zone2 {
policy idp-app-policy-1 {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
application-services {
idp;
}
}
}
}
}
from-zone Zone2 to-zone Zone1 {
policy idp-app-policy-2 {
match {
source-address any;
destination-address any;
application any;
}
then {
permit {
application-services {
idp;
}
}
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
59
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements
Before you begin, review the inline tap mode feature. See Understanding IDP Inline Tap
Mode on page 12.
Overview
The inline tap mode feature provides passive, inline detection of Application Layer threats
for traffic matching security policies that have the IDP application service enabled.
NOTE: IDP inline tap mode does not require a separate tap or span port.
Configuration
Step-by-Step
Procedure
2.
3.
NOTE: When switching to inline tap mode or back to regular mode, you
must restart the device .
60
4.
If you want to switch the device back to regular mode, delete inline tap mode
configuration.
[edit security]
user@host# delete forwarding-process application-services maximize-idp-sessions
inline-tap
Verification
To verify that inline tap mode is enabled, enter the show security idp status command.
The line item for the forwarding process mode shows Forwarding process mode :
maximizing sessions (Inline-tap).
Related
Documentation
61
62
CHAPTER 7
Requirements
Before you begin:
Configure network interfaces. See Junos OS Interfaces Configuration Guide for Security
Devices.
Define rules in a rulebase. See Example: Defining Rules for an IDP IPS Rulebase on
page 65.
Overview
The IDP rule-matching algorithm starts from the top of the rulebase and checks traffic
against all rules in the rulebase that match the specified match conditions. You determine
the sequence in which rules are applied to network traffic by placing them in the desired
order. When you add a rule to the rulebase, it is placed at the end of the existing list of
rules. To place a rule in any other location than at the end of the rulebase, you insert the
rule at the desired location in the rulebase. This example places rule R2 before rule R1 in
the IDP IPS rulebase in a policy called base-policy.
Configuration
Step-by-Step
Procedure
Define the position of the rule in the rulebase based on the order in which you want
the rule to be evaluated.
63
[edit]
user@host# insert security idp idp-policy base-policy rulebase-ips rule R2 before
rule R1
2.
Verification
To verify the configuration is working properly, enter the show security idp status command.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements
Before you begin:
Configure network interfaces. See Junos OS Interfaces Configuration Guide for Security
Devices.
Define rules in a rulebase. See Example: Defining Rules for an IDP IPS Rulebase on
page 65.
Overview
In a rulebase, you can disable and enable rules by using the deactivate and activate
commands. The deactivate command comments out the specified statement from the
configuration. Rules that have been deactivated do not take effect when you issue the
commit command. The activate command adds the specified statement back to the
configuration. Rules that have been activated take effect when you next issue the commit
command. This example shows how to deactivate and reactivate rule R2 in an IDP IPS
rulebase that is associated with a policy called base-policy.
Configuration
Step-by-Step
Procedure
64
3.
Verification
To verify the configuration is working properly, enter the show security idp status command.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements on page 65
Overview on page 65
Configuration on page 66
Verification on page 68
Requirements
Before you begin:
Configure network interfaces. See the Junos OS Interfaces Configuration Guide for
Security Devices.
Enable IDP in security policies. See Example: Enabling IDP in a Security Policy on
page 57.
Overview
Each rule is composed of match conditions, objects, actions, and notifications. When
you define an IDP rule, you must specify the type of network traffic you want IDP to
monitor for attacks by using the following characteristicssource zone, destination zone,
source IP address, destination IP address, and the Application Layer protocol supported
65
by the destination IP address. The rules are defined in rulebases, and rulebases are
associated with policies.
This example describes how to create a policy called base-policy, specify a rulebase for
this policy, and then add rule R1 to this rulebase. In this example, rule R1:
Specifies the match condition to include any traffic from a previously configured zone
called trust to another previously configured zone called untrust. The match condition
also includes a predefined attack group Critical - TELNET. The application setting in
the match condition is default and matches any application configured in the attack
object.
Specifies an action to drop connection for any traffic that matches the criteria for rule
R1.
Enables attack logging and specifies that an alert flag is added to the attack log.
After defining the rule, you specify base-policy as the active policy on the device.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set security idp idp-policy base-policy
set security idp idp-policy base-policy rulebase-ips rule R1 match from-zone trust to-zone
untrust source-address any destination-address any application default
set security idp idp-policy base-policy rulebase-ips rule R1 match attacks
predefined-attack-groups "TELNET-Critical"
set security idp idp-policy base-policy rulebase-ips rule R1 then action drop-connection
set security idp idp-policy base-policy rulebase-ips rule R1 then notification log-attacks
alert
set security idp idp-policy base-policy rulebase-ips rule R1 then severity critical
set security idp active-policy base-policy
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To define rules for an IDP IPS rulebase:
1.
2.
3.
66
5.
6.
7.
8.
9.
Results
From configuration mode, confirm your configuration by entering the show security idp
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security idp
idp-policy base-policy {
rulebase-ips {
rule R1 {
match {
from-zone trust;
source-address any;
to-zone untrust;
destination-address any;
application default;
attacks {
predefined-attack-groups Critical-TELNET;
}
}
then {
action {
drop-connection;
}
notification {
log-attacks {
alert;
67
}
}
severity critical;
}
}
}
}
active-policy base-policy;
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
Verify that the rules for the IDP IPS rulebase configuration are correct.
Action
From operational mode, enter the show security idp status command.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements on page 68
Overview on page 68
Configuration on page 69
Verification on page 70
Requirements
Before you begin, create rules in the IDP IPS rulebase. See Example: Defining Rules for
an IDP IPS Rulebase on page 65.
Overview
When you create an exempt rule, you must specify the following:
68
Source and destination for traffic you want to exempt. You can set the source or
destination to Any to exempt network traffic originating from any source or sent to any
destination. You can also set source-except or destination-except to specify all the
sources or destinations except the specified source or destination addresses.
The attacks you want IDP to exempt for the specified source/destination addresses.
You must include at least one attack object in an exempt rule.
This example shows that the IDP policy generates false positives for the attack
FTP:USER:ROOT on an internal network. You configure the rule to exempt attack detection
for this attack when the source IP is from your internal network.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set security idp idp-policy base-policy
set security idp idp-policy base-policy rulebase-exempt rule R1 match from-zone trust
to-zone any
set security idp idp-policy base-policy rulebase-exempt rule R1 match source-address
internal-devices destination-address any
set security idp idp-policy base-policy rulebase-exempt rule R1 match attacks
predefined-attacks "FTP:USER:ROOT"
set security idp active-policy base-policy
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To define rules for an exempt IDP rulebase:
1.
Specify the IDP IPS rulebase for which you want to define and exempt the rulebase.
[edit]
user@host# edit security idp idp-policy base-policy
2.
Associate the exempt rulebase with the policy and zones, and add a rule to the
rulebase.
[edit security idp idp-policy base-policy]
user@host# set rulebase-exempt rule R1 match from-zone trust to-zone any
3.
4.
Specify the attacks that you want to exempt from attack detection.
[edit security idp idp-policy base-policy]
user@host# set rulebase-exempt rule R1 match attacks predefined-attacks
"FTP:USER:ROOT"
69
5.
Results
From configuration mode, confirm your configuration by entering the show security idp
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security idp
idp-policy base-policy {
rulebase-exempt {
rule R1 {
match {
from-zone trust;
source-address internal-devices;
to-zone any;
destination-address any;
attacks {
predefined-attacks FTP:USER:ROOT;
}
}
}
}
active-policy base-policy;
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
Related
Documentation
70
Verify that the defined rules were exempt from the IDP rulebase configuration.
From operational mode, enter the show security idp status command.
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements on page 71
Overview on page 71
Configuration on page 71
Verification on page 72
Requirements
Before you begin:
Configure network interfaces. See the Junos OS Interfaces Configuration Guide for
Security Devices.
Enable IDP application services in a security policy. See Example: Enabling IDP in a
Security Policy on page 57.
Define rules. See Example: Inserting a Rule in the IDP Rulebase on page 63.
Overview
By default, rules in the IDP rulebase are not terminal, which means IDP examines all rules
in the rulebase and executes all matches. You can specify that a rule is terminal; that is,
if IDP encounters a match for the source, destination, and service specified in a terminal
rule, it does not examine any subsequent rules for that connection.
This example shows how to configure terminal rules. You define rule R2 to terminate the
match algorithm if the source IP of the traffic originates from a known trusted network
in your company. If this rule is matched, IDP disregards traffic from the trusted network
and does not monitor the session for malicious data.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set security idp idp-policy base-policy rulebase-ips rule R2
set security idp idp-policy base-policy rulebase-ips rule R2 match source-address internal
destination-address any
set security idp idp-policy base-policy rulebase-ips rule R2 terminal
71
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure terminal rules:
1.
2.
3.
Results
From configuration mode, confirm your configuration by entering the show security idp
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security idp
idp-policy base-policy {
rulebase-ips {
rule R2 {
match {
source-address internal;
destination-address any;
}
terminal;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
72
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements on page 73
Overview on page 73
Configuration on page 74
Verification on page 75
Requirements
Before you begin:
Configure network interfaces. See the Junos OS Interfaces Configuration Guide for
Security Devices.
Enable IDP application services in a security policy. See Example: Enabling IDP in a
Security Policy on page 57.
Define rules. See Example: Inserting a Rule in the IDP Rulebase on page 63.
Overview
Configuring DSCP values in IDP policies provides a method of associating CoS valuesthus
different levels of reliabilityfor different types of traffic on the network.
This example shows how to create a policy called policy1, specify a rulebase for this
policy, and then add rule R1 to this rulebase. In this example, rule R1:
Specifies the match condition to include any traffic from a previously configured zone
called trust to another previously configured zone called untrust. The match condition
also includes a predefined attack group called HTTP - Critical. The application setting
in the match condition is specified as the default and matches any application
configured in the attack object.
Specifies an action to rewrite the CoS field in the IP header with the DSCP value 50
for any traffic that matches the criteria for rule R1.
73
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set security idp idp-policy base-policy
set security idp idp-policy base-policy rulebase-ips rule R1 match from-zone Zone-1 to-zone
Zone-2 source-address any destination-address any application default
set security idp idp-policy base-policy rulebase-ips rule R1 match attacks
predefined-attack-groups "HTTP - Critical"
set security idp idp-policy base-policy rulebase-ips rule R1 then action mark-diffserv 50
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure DSCP values in an IDP policy:
1.
2.
3.
4.
5.
6.
Continue to specify any notification or logging options for the rule, if required.
7.
Results
74
From configuration mode, confirm your configuration by entering the show security idp
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security idp
idp-policy base-policy{
rulebase-ips {
rule R1 {
match {
from-zone trust;
source-address any;
to-zone untrust;
destination-address any;
application default;
attacks {
predefined-attack-groups HTTP-Critical;
}
}
then {
action {
mark-diffserv {
50;
}
}
}
}
}
active-policy base-policy;
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
75
76
CHAPTER 8
Requirements on page 77
Overview on page 77
Configuration on page 77
Verification on page 79
Requirements
Before you begin:
Configure network interfaces. See the Junos OS Interfaces Configuration Guide for
Security Devices.
Enable IDP application services in a security policy. See Example: Enabling IDP in a
Security Policy on page 57.
Overview
To create custom applications, specify a meaningful name for an application and
associate parameters with itfor example, inactivity timeout, or application protocol
type. In this example, you create a special FTP application called cust-app, specify it as
a match condition in the IDP policy ABC running on port 78, and specify the inactivity
timeout value as 6000 seconds.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set applications application cust-app application-protocol ftp protocol tcp
destination-port 78 inactivity-timeout 6000
77
set security idp idp-policy ABC rulebase-ips rule ABC match application cust-app
set security idp idp-policy ABC rulebase-ips rule ABC then action no-action
set security idp active-policy ABC
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To create an application and associate it with an IDP policy:
1.
2.
3.
4.
Results
From configuration mode, confirm your configuration by entering the show security idp
and show applications commands. If the output does not display the intended
configuration, repeat the configuration instructions in this example to correct it.
[edit]
user@host# show security idp
idp-policy ABC {
rulebase-ips {
rule R1 {
match {
application cust-app;
}
}
}
}
active-policy ABC;
[edit]
user@host# show applications
application cust-app {
application-protocol ftp;
protocol tcp;
destination-port 78;
inactivity-timeout 6000;
}
If you are done configuring the device, enter commit from configuration mode.
78
Verification
To confirm that the configuration is working properly, perform this task:
Related
Documentation
Verify that the application was associated with the IDP policy.
From operational mode, enter the show security idp status command.
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements on page 79
Overview on page 79
Configuration on page 80
Verification on page 81
Requirements
Before you begin:
Configure network interfaces. See the Junos OS Interfaces Configuration Guide for
Security Devices.
Enable IDP application services in a security policy. See Example: Enabling IDP in a
Security Policy on page 57.
Overview
To configure an application set, you add predefined or custom applications separately
to an application set and assign a meaningful name to the application set. Once you
name the application set you specify the name as part of the policy. For this policy to
apply on a packet, the packet must match any one of the applications included in this
set.
79
This example describes how to create an application set called SrvAccessAppSet and
associate it with IDP policy ABC. The application set SrvAccessAppSet combines three
applications. Instead of specifying three applications in the policy rule, you specify one
application set. If all of the other criteria match, any one of the applications in the
application set serves as valid matching criteria.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set applications application-set SrvAccessAppSet application junos-ssh
set applications application-set SrvAccessAppSet application junos-telnet
set applications application-set SrvAccessAppSet application cust-app
set security idp idp-policy ABC rulebase-ips rule ABC match application SrvAccessAppSet
set security idp idp-policy ABC rulebase-ips rule ABC then action no-action
set security idp active-policy ABC
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To create an application set and associate it with an IDP policy:
1.
2.
3.
4.
5.
Results
80
From configuration mode, confirm your configuration by entering the show security idp
and show applications commands. If the output does not display the intended
configuration, repeat the configuration instructions in this example to correct it.
[edit]
user@host# show security idp
idp-policy ABC {
rulebase-ips {
rule R1 {
match {
application SrvAccessAppSet;
}
then {
action {
no-action;
}
}
}
}
}
active-policy ABC;
[edit]
user@host# show applications
application-set SrvAccessAppSet {
application ssh;
application telnet;
application custApp;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
Related
Documentation
Verify that the application set was associated with the IDP policy.
From operational mode, enter the show security idp status command.
Junos OS Feature Support Reference for SRX Series and J Series Devices
81
82
CHAPTER 9
Example: Configuring Attack Groups with Dynamic Attack Groups and Custom Attack
Groups on page 96
Requirements
Before you begin, review the IDP protocol decoders feature. See Understanding IDP
Protocol Decoders on page 49.
Overview
The Junos IDP module ships with a set of preconfigured protocol decoders. These protocol
decoders have default settings for various protocol-specific contextual checks that they
perform. You can use the default settings or tune them to meet your site's specific needs.
This example shows you how to tune the protocol decoder for FTP.
Configuration
Step-by-Step
Procedure
2.
83
Verification
To verify the configuration is working properly, enter the show security idp status command.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements on page 84
Overview on page 84
Configuration on page 84
Verification on page 85
Requirements
Before you begin, review the IDP content decompression feature. See Understanding
Content Decompression on page 51
Overview
The decompression feature is disabled by default. In this example, you enable the detector,
configure the maximum memory to 50,000 kilobytes, and configure a maximum
decompression ratio of 16:1.
Configuration
Step-by-Step
Procedure
84
2.
3.
4.
Verification
To verify the configuration is working properly, enter the show security idp status ips
command. The content-decompress counters provide statistics on decompression
processing.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements on page 85
Overview on page 85
Configuration on page 86
Verification on page 88
Requirements
Before you begin, configure network interfaces. See the Junos OS Interfaces Configuration
Guide for Security Devices.
Overview
In this example, you create a signature attack called sig1 and assign it the following
properties:
85
Time bindingSpecifies the scope as source and the count as 10. When scope is source,
all attacks from the same source are counted, and when the number of attacks reaches
the specified count (10), the attack is logged. In this example, every tenth attack from
the same source is logged.
Once you have configured a signature-based attack object, you specify the attack as
match criteria in an IDP policy rule. See Example: Defining Rules for an IDP IPS Rulebase
on page 65.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set security idp custom-attack sig1 severity major
set security idp custom-attack sig1 recommended-action drop-packet
set security idp custom-attack sig1 time-binding scope source count 10
set security idp custom-attack sig1 attack-type signature context packet
set security idp custom-attack sig1 attack-type signature shellcode intel
set security idp custom-attack sig1 attack-type signature protocol ip ttl value 128 match
equal
set security idp custom-attack sig1 attack-type signature protocol-binding tcp
minimum-port 50 maximum-port 100
set security idp custom-attack sig1 attack-type signature direction any
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To create a signature-based attack object:
1.
2.
86
4.
5.
6.
7.
Results
From configuration mode, confirm your configuration by entering the show security idp
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security idp
custom-attack sig1 {
recommended-action drop-packet;
severity major;
time-binding {
count 10;
scope source;
}
attack-type {
signature {
protocol-binding {
tcp {
minimum-port 50 maximum-port 100;
}
}
context packet;
direction any;
shellcode intel;
protocol {
ip {
ttl {
match equal;
value 128;
}
}
}
87
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements on page 88
Overview on page 88
Configuration on page 89
Verification on page 90
Requirements
Before you begin, configure network interfaces. See the Junos OS Interfaces Configuration
Guide for Security Devices
Overview
In this example, you create a protocol anomaly attack called anomaly1 and assign it the
following properties:
88
Time bindingSpecifies the scope as peer and count as 2 to detect anomalies between
source and destination IP addresses of the sessions for the specified number of times.
Severity (info)Provides information about any attack that matches the conditions.
Once you have configured the protocol anomaly-based attack object, you specify the
attack as match criteria in an IDP policy rule. See Example: Defining Rules for an IDP IPS
Rulebase on page 65.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set security idp custom-attack anomaly1 severity info
set security idp custom-attack anomaly1 time-binding scope peer count 2
set security idp custom-attack anomaly1 attack-type anomaly test
OPTIONS_UNSUPPORTED
set security idp custom-attack sa
set security idp custom-attack sa attack-type anomaly service TCP
set security idp custom-attack sa attack-type anomaly direction any
set security idp custom-attack sa attack-type anomaly shellcode sparc
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To create a protocol anomaly-based attack object:
1.
2.
3.
89
4.
Results
From configuration mode, confirm your configuration by entering the show security idp
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security idp
custom-attack anomaly1 {
severity info;
time-binding {
count 2;
scope peer;
}
attack-type {
anomaly {
test OPTIONS_UNSUPPORTED;
service TCP;
direction any;
shellcode sparc;
}
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
Related
Documentation
90
Junos OS Feature Support Reference for SRX Series and J Series Devices
List supported test conditions for ICMP and choose the one you want to configure.
The supported test conditions are available in the CLI at the [edit security idp
custom-attack test1 attack-type anomaly] hierarchy level.
user@host#set test icmp?
Possible completions:
<test>
Protocol anomaly condition to be checked
ADDRESSMASK_REQUEST
DIFF_CHECKSUM_IN_RESEND
DIFF_CHECKSUM_IN_RESPONSE
DIFF_LENGTH_IN_RESEND
2. Configure the service for which you want to configure the test condition.
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Requirements on page 91
Overview on page 92
Configuration on page 92
Verification on page 96
Requirements
Before you begin, IDP must be supported and enabled on the device.
See the Attack Properties (Compound or Chain Attacks) section in the Junos OS Security
Configuration Guide.
91
Overview
A compound or a chain attack object can combine the signatures and anomalies to form
a single attack object. A single attack object can contain:
Compound or chain attack objects are used to reduce false positives and to increase
detection accuracy. It enables you to be specific about the events that need to occur
before IDP identifies traffic as an attack.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set security idp idp-policy idpengine rulebase-ips rule 1 match from-zone any
set security idp idp-policy idpengine rulebase-ips rule 1 match source-address any
set security idp idp-policy idpengine rulebase-ips rule 1 match to-zone any
set security idp idp-policy idpengine rulebase-ips rule 1 match destination-address any
set security idp idp-policy idpengine rulebase-ips rule 1 match application default
set security idp idp-policy idpengine rulebase-ips rule 1 match attacks custom-attacks
ftpchain
set security idp idp-policy idpengine rulebase-ips rule 1 then action no-action
set security idp idp-policy idpengine rulebase-ips rule 1 then notification log-attacks
set security idp active-policy idpengine
set security idp custom-attack ftpchain severity info
set security idp custom-attack ftpchain attack-type chain protocol-binding application
ftp
set security idp custom-attack ftpchain attack-type chain scope session
set security idp custom-attack ftpchain attack-type chain order
set security idp custom-attack ftpchain attack-type chain member m1 attack-type
signature context ftp-banner
set security idp custom-attack ftpchain attack-type chain member m1 attack-type
signature pattern .*vsFTPd.*
set security idp custom-attack ftpchain attack-type chain member m1 attack-type
signature direction server-to-client
set security idp custom-attack ftpchain attack-type chain member m2 attack-type
signature context ftp-username
set security idp custom-attack ftpchain attack-type chain member m2 attack-type
signature pattern .*root.*
set security idp custom-attack ftpchain attack-type chain member m2 attack-type
signature direction client-to-server
set security idp custom-attack ftpchain attack-type chain member m3 attack-type
anomaly test LOGIN_FAILED
set security idp custom-attack ftpchain attack-type chain member m3 attack-type
anomaly direction any
set security idp traceoptions file idpd
set security idp traceoptions flag all
92
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure compound or chain attacks for specific match criteria:
1.
2.
3.
4.
5.
6.
Specify the match attack object and name for the attack object.
[edit security idp idp-policy idpengine rulebase-ips rule 1]
user@host# set match attacks custom-attacks ftpchain
7.
8.
9.
10.
11.
93
12.
Set the attack type and the application name for the custom attack.
[edit security idp custom-attack ftpchain]
user@host# set attack-type chain protocol-binding application ftp
13.
Set the scope and the order in which the attack is defined.
[edit security idp custom-attack ftpchain attack-type chain]
user@host# set scope session
user@host# set order
14.
Specify a name for the first member of the chain attack object.
[edit security idp custom-attack ftpchain attack-type chain]
user@host# set member m1
15.
Set the context, pattern, and direction for the first member of the chain attack
object.
[edit security idp custom-attack ftpchain attack-type chain member m1]
user@host# set attack-type signature context ftp-banner
user@host# set attack-type signature pattern .*vsFTPd.*
user@host# set attack-type signature direction server-to-client
16.
Specify a name for the second member of the chain attack object.
[edit security idp custom-attack ftpchain attack-type chain]
user@host# set member m2
17.
Set the context, pattern, and direction for the second member of the chain attack
object.
[edit security idp custom-attack ftpchain attack-type chain member m2]
user@host# set attack-type signature context ftp-username
user@host# set attack-type signature pattern .*root.*
user@host# set attack-type signature direction client-to-server
18.
Specify a name for the third member of the chain attack object.
[edit security idp custom-attack ftpchain attack-type chain]
user@host# set member m3
19.
Specify an attack-type and direction for the third member of the chain attack object.
[edit security idp custom-attack ftpchain attack-type chain member m3]
user@host# set attack-type anomaly direction any
20.
Specify the trace options and trace file information for the IDP services.
[edit]
user@host# set security idp traceoptions file idpd
21.
Specify the events and other information which needs to be included in the trace
output.
[edit]
user@host# set security idp traceoptions flag all
Results
94
From configuration mode, confirm your configuration by entering the show security idp
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security idp
idp-policy idpengine {
rulebase-ips {
rule 1 {
match {
from-zone any;
source-address any;
to-zone any;
destination-address any;
application default;
attacks {
custom-attacks ftpchain;
}
}
then {
action {
no-action;
}
notification {
log-attacks;
}
}
}
}
}
active-policy idpengine;
custom-attack ftpchain {
severity info;
attack-type {
chain {
protocol-binding {
application ftp;
}
scope session;
order;
member m1 {
attack-type {
signature {
context ftp-banner;
pattern .*vsFTPd.*;
direction server-to-client;
}
}
}
member m2 {
attack-type {
signature {
context ftp-username;
pattern .*root.*;
direction client-to-server;
}
}
}
member m3 {
attack-type {
95
anomaly {
test LOGIN_FAILED;
direction any;
}
}
}
}
}
}
traceoptions {
file idpd;
flag all;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
Example: Configuring Attack Groups with Dynamic Attack Groups and Custom Attack
Groups
This example shows how to configure attack groups with dynamic attack groups and
custom attack groups.
96
Requirements on page 97
Overview on page 97
Configuration on page 97
Requirements
Before you begin, install the security package on the device only if one of the following
statements is true:
NOTE: If custom attack groups contain only custom attacks, the security
package license is not required and the security package need not be installed
on the device. To instal the security package, you need an IDP security package
license.
See the Attack Object Groups section in the Junos OS Security Configuration Guide.
Overview
IDP contains a large number of predefined attack objects. To manage and organize IDP
policies, attack objects can be grouped. An attack object group can contain two or more
types of attack objects. The attack groups are classified as follows:
Custom attack groupContains a list of attacks that are specified in the attack
definition. A custom attack group can also contain specific predefined attacks, custom
attacks, predefined attack groups, or dynamic attack groups. A custom attack group
is static in nature as the attacks are specified in the group. Therefore, the attack group
do not change when the security database is updated. The members can be predefined
attacks or predefined attack groups from the signature database or other custom
attacks and dynamic attack groups.
Configuration
CLI Quick
Configuration
To quickly configure this example, copy the following commands, paste them into a text
file, remove any line breaks, change any details necessary to match your network
configuration, and then copy and paste the commands into the CLI at the [edit] hierarchy
level.
set security idp idp-policy idpengine rulebase-ips rule 1 match from-zone any
set security idp idp-policy idpengine rulebase-ips rule 1 match source-address any
set security idp idp-policy idpengine rulebase-ips rule 1 match to-zone any
set security idp idp-policy idpengine rulebase-ips rule 1 match destination-address any
set security idp idp-policy idpengine rulebase-ips rule 1 match application default
97
Step-by-Step
Procedure
The following example requires you to navigate various levels in the configuration
hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration
Mode in the CLI User Guide.
To configure attack groups with dynamic attack groups and custom attack groups:
1.
2.
3.
4.
5.
6.
98
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Specify a list of attacks or attack groups that belongs to the custom attack group.
[edit security idp custom-attack-group cust-group]
user@host# set group-members customftp
user@host# set group-members ICMP:INFO:TIMESTAMP
user@host# set group-members "TELNET - Major"
user@host# set group-members dyn1
18.
19.
99
21.
Configure a filter for the second dynamic attack group and set the direction and its
values for this field.
[edit security idp dynamic-attack-group dyn2 ]
user@host# set filters direction expression and
user@host# set filters direction values server-to-client
user@host# set filters direction values client-to-server
22.
Specify the trace options and trace file information for the IDP services.
[edit]
user@host# set security idp traceoptions file idpd
23.
Specify the events and other information which needs to be included in the trace
output.
[edit]
user@host# set security idp traceoptions flag all
Results
From configuration mode, confirm your configuration by entering the show security idp
command. If the output does not display the intended configuration, repeat the
configuration instructions in this example to correct it.
[edit]
user@host# show security idp
idp-policy idpengine {
rulebase-ips {
rule 1 {
match {
from-zone any;
source-address any;
to-zone any;
destination-address any;
application default;
attacks {
custom-attack-groups cust-group;
dynamic-attack-groups dyn2;
}
}
then {
action {
no-action;
}
notification {
log-attacks;
}
}
}
}
}
100
active-policy idpengine;
custom-attack customftp {
severity info;
attack-type {
signature {
context ftp-username;
pattern .*guest.*;
direction client-to-server;
}
}
}
custom-attack-group cust-group {
group-members [ customftp ICMP:INFO:TIMESTAMP "TELNET - Major" dyn1 ];
}
dynamic-attack-group dyn1 {
filters {
category {
values TROJAN;
}
}
}
dynamic-attack-group dyn2 {
filters {
direction {
expression and;
values [ server-to-client client-to-server ];
}
}
}
traceoptions {
file idpd;
flag all;
}
If you are done configuring the device, enter commit from configuration mode.
Verification
Verifying the Configuration
Purpose
Action
Related
Documentation
Junos OS Feature Support Reference for SRX Series and J Series Devices
101
102
CHAPTER 10
Configuration Statements
103
104
105
106
107
Related
Documentation
108
idp {
active-policy policy-name;
application-ddos application-name {
connection-rate-threshold number;
context context-name {
exclude-context-values [value];
hit-rate-threshold number;
max-context-values number;
time-binding-count number;
time-binding-period seconds;
value-hit-rate-threshold number;
}
service service-name;
}
custom-attack attack-name {
attack-type {
anomaly {
direction (any | client-to-server | server-to-client);
service service-name;
shellcode (all | intel | no-shellcode | sparc);
test test-condition;
}
chain {
expression boolean-expression;
member member-name {
attack-type {
(anomaly ...same statements as in [edit security idp custom-attack
attack-name attack-type anomaly] hierarchy level | signature ...same
statements as in [edit security idp custom-attack attack-name attack-type
signature] hierarchy level);
}
}
order;
protocol-binding {
application application-name;
icmp;
icmpv6;
ip {
protocol-number transport-layer-protocol-number;
}
ipv6 {
protocol-number transport-layer-protocol-number;
}
nested-application nested-application-name;
rpc {
program-number rpc-program-number;
}
tcp {
minimum-port port-number <maximum-port port-number>;
}
udp {
minimum-port port-number <maximum-port port-number>;
}
}
reset;
scope (session | transaction);
109
}
signature {
context context-name;
direction (any | client-to-server | server-to-client);
negate;
pattern signature-pattern;
protocol {
icmp {
code {
match (equal | greater-than | less-than | not-equal);
value code-value;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
type {
match (equal | greater-than | less-than | not-equal);
value type-value;
}
}
ipv4 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
ip-flags {
(df | no-df);
(mf | no-mf);
(rb | no-rb);
}
protocol {
match (equal | greater-than | less-than | not-equal);
value transport-layer-protocol-id;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
tos {
match (equal | greater-than | less-than | not-equal);
value type-of-service-in-decimal;
}
total-length {
110
111
value maximum-segment-size;
}
option {
match (equal | greater-than | less-than | not-equal);
value tcp-option;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
tcp-flags {
(ack | no-ack);
(fin | no-fin);
(psh | no-psh);
(r1 | no-r1);
(r2 | no-r2);
(rst | no-rst);
(syn | no-syn);
(urg | no-urg);
}
urgent-pointer {
match (equal | greater-than | less-than | not-equal);
value urgent-pointer;
}
window-scale {
match (equal | greater-than | less-than | not-equal);
value window-scale-factor;
}
window-size {
match (equal | greater-than | less-than | not-equal);
value window-size;
}
}
udp {
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
}
}
protocol-binding {
application application-name;
icmp;
icmpv6;
112
ip {
protocol-number transport-layer-protocol-number;
}
ipv6 {
protocol-number transport-layer-protocol-number;
}
nested-application nested-application-name;
rpc {
program-number rpc-program-number;
}
tcp {
minimum-port port-number <maximum-port port-number>;
}
udp {
minimum-port port-number <maximum-port port-number>;
}
}
regexp regular-expression;
shellcode (all | intel | no-shellcode | sparc);
}
}
recommended-action (close | close-client | close-server | drop | drop-packet | ignore
| none);
severity (critical | info | major | minor | warning);
time-binding {
count count-value;
scope (destination | peer | source);
}
}
custom-attack-group custom-attack-group-name {
group-members [attack-or-attack-group-name];
}
dynamic-attack-group dynamic-attack-group-name {
filters {
category {
values [category-value];
}
direction {
expression (and | or);
values [any client-to-server exclude-any exclude-client-to-server
exclude-server-to-client server-to-client];
}
false-positives {
values [frequently occasionally rarely unknown];
}
performance {
values [fast normal slow unknown];
}
products {
values [product-value];
}
recommended;
service {
values [service-value];
}
severity {
113
114
source-except [address-name];
to-zone (zone-name | any);
}
}
}
rulebase-ips {
rule rule-name {
description text;
match {
application (application-name | any | default);
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any );
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
terminal;
then {
action {
class-of-service {
dscp-code-point number;
forwarding-class forwarding-class;
}
(close-client | close-client-and-server | close-server |drop-connection |
drop-packet | ignore-connection | mark-diffserv value | no-action |
recommended);
}
ip-action {
(ip-block | ip-close | ip-notify);
log;
log-create;
refresh-timeout;
target (destination-address | service | source-address | source-zone |
source-zone-address | zone-service);
timeout seconds;
}
notification {
log-attacks {
alert;
}
packet-log {
post-attack number;
post-attack-timeout seconds;
pre-attack number;
}
}
severity (critical | info | major | minor | warning);
}
115
}
}
}
security-package {
automatic {
download-timeout minutes;
enable;
interval hours;
start-time start-time;
}
install {
ignore-version-check;
}
source-address address;
url url-name;
}
sensor-configuration {
application-ddos {
statistics {
interval minutes;
}
}
application-identification {
max-packet-memory value;
max-tcp-session-packet-memory value;
max-udp-session-packet-memory value;
}
detector {
protocol-name protocol-name {
tunable-name tunable-name {
tunable-value protocol-value;
}
}
}
flow {
(allow-icmp-without-flow | no-allow-icmp-without-flow);
fifo-max-size value;
hash-table-size value;
(log-errors | no-log-errors);
max-timers-poll-ticks value;
reject-timeout value;
(reset-on-policy | no-reset-on-policy);
udp-anticipated-timeout value;
}
global {
(enable-all-qmodules | no-enable-all-qmodules);
(enable-packet-pool | no-enable-packet-pool);
gtp (decapsulation | no-decapsulation);
memory-limit-percent value;
(policy-lookup-cache | no-policy-lookup-cache);
}
high-availability {
no-policy-cold-synchronization;
}
ips {
content-decompression-max-memory-kb value;
116
content-decompression-max-ratio value;
(detect-shellcode | no-detect-shellcode);
fifo-max-size value;
(ignore-regular-expression | no-ignore-regular-expression);
log-supercede-min minimum-value;
pre-filter-shellcode;
(process-ignore-s2c | no-process-ignore-s2c);
(process-override | no-process-override);
process-port port-number;
}
log {
cache-size size;
suppression {
disable;
(include-destination-address | no-include-destination-address);
max-logs-operate value;
max-time-report value;
start-log value;
}
}
packet-log {
host ip-address <port number>;
max-sessions percentage;
source-address ip-address;
total-memory percentage;
}
re-assembler {
(ignore-memory-overflow | no-ignore-memory-overflow);
(ignore-reassembly-memory-overflow | no-ignore-reassembly-memory-overflow);
ignore-reassembly-overflow;
max-flow-mem value;
max-packet-mem value;
}
ssl-inspection {
cache-prune-chunk-size number;
key-protection;
maximum-cache-size number;
session-id-cache-timeout seconds;
sessions number;
}
}
traceoptions {
file {
filename;
files number;
match regular-expression;
(no-world-readable | world-readable);
size maximum-file-size;
}
flag all;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
}
}
117
Related
Documentation
118
Junos OS Feature Support Reference for SRX Series and J Series Devices
Hierarchy Level
Release Information
Description
application-services {
maximize-alg-sessions;
maximize-cp-sessions;
maximize-idp-sessions {
inline-tap;
weight (equal | firewall | idp);
}
session-distribution-mode {
hash-based;
}
}
[edit security forwarding-process]
RTSP, FTP, and TFTP ALG session capacity: 25K per flow SPU
NOTE: Flow session capacity will be reduced to half per flow SPU and that
the above capacity numbers will not change on CP-flow.
Options
Required Privilege
Level
119
Related
Documentation
ack-number
Syntax
Hierarchy Level
Release Information
Description
Options
ack-number {
match (equal | greater-than | less-than | not-equal);
value acknowledgement-number;
}
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
120
Hierarchy Level
Release Information
Description
Options
action {
(close-server | drop-connection | drop-packet | no-action);
}
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then]
close-serverCloses the connection and sends an RST packet to the server but not to
the client.
for the connection from reaching its destination. Use this action to drop connections
for traffic that is not prone to spoofing.
drop-packetDrops a matching packet before it can reach its destination but does not
close the connection. Use this action to drop packets for attacks in traffic that is prone
to spoofing, such as UDP traffic. Dropping a connection for such traffic could result in
a denial of service that prevents you from receiving traffic from a legitimate source-IP
address.
no-actionNo action is taken. Use this action when you want to only generate logs for
some traffic.
Required Privilege
Level
Related
Documentation
121
Hierarchy Level
Release Information
Description
Options
action {
class-of-service {
dscp-code-point number;
forwarding-class forwarding-class;
}
(close-client | close-client-and-server | close-server |drop-connection | drop-packet |
ignore-connection | mark-diffserv value | no-action | recommended);
}
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then]
IDP policy; also sets the value of the DSCP code point. You can use the default
forwarding class names or define new ones. Forwarding-class and dscp-code-point
are optional, but one must be set.
close-clientCloses the connection and sends an RST packet to the client but not to
the server.
close-serverCloses the connection and sends an RST packet to the server but not to
the client.
for the connection from reaching its destination. Use this action to drop connections
for traffic that is not prone to spoofing.
drop-packetDrops a matching packet before it can reach its destination but does not
close the connection. Use this action to drop packets for attacks in traffic that is prone
to spoofing, such as UDP traffic. Dropping a connection for such traffic could result in
a denial of service that prevents you from receiving traffic from a legitimate source-IP
address.
match is found. IDP disables the rulebase for the specific connection.
no-actionNo action is taken. Use this action when you want to only generate logs for
some traffic.
them. This is the action that Juniper Networks recommends when that attack is
detected.
122
Required Privilege
Level
Related
Documentation
active-policy
Syntax
Hierarchy Level
Release Information
Description
Options
active-policy policy-name;
[edit security idp]
NOTE: You need to make sure the active policy is enforced in the data plane.
Required Privilege
Level
Related
Documentation
alert
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
alert;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then notification]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then notification]
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Set an alert flag in the Alert column of the Log Viewer for the matching log record.
securityTo view this statement in the configuration.
security-controlTo add this statement to the configuration.
123
allow-icmp-without-flow
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
(allow-icmp-without-flow | no-allow-icmp-without-flow);
[edit security idp sensor-configuration flow]
anomaly
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
124
anomaly {
direction (any | client-to-server | server-to-client);
service service-name;
shellcode (all | intel | no-shellcode | sparc);
test test-condition;
}
[edit security idp custom-attack attack-name attack-type]
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
application application-name;
[edit security idp custom-attack attack-name attack-type chain protocol-binding]
[edit security idp custom-attack attack-name attack-type signature protocol-binding]
anyMatch all ports to the only application implied in the attack objects.
125
application application-name;
[edit security idp idp-policy policy-name rulebase-ips rule rule-name match]
application-ddos
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
126
application-ddos application-name {
connection-rate-threshold number;
context context-name {
exclude-context-values [value];
hit-rate-threshold number;
max-context-values number;
time-binding-count number;
time-binding-period seconds;
value-hit-rate-threshold number;
}
service service-name;
}
[edit security idp]
application-identification
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
application-identification {
max-packet-memory value;
max-tcp-session-packet-memory value;
max-udp-session-packet-memory value;
}
[edit security idp sensor-configuration]
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
attack-type {
anomaly {
direction (any | client-to-server | server-to-client);
service service-name;
shellcode (all | intel | no-shellcode | sparc);
test test-condition;
}
}
[edit security idp custom-attack attack-name]
127
Hierarchy Level
Release Information
Description
attack-type {
chain {
expression boolean-expression;
member member-name {
attack-type {
(anomaly ...same statements as in [edit security idp custom-attack attack-name
attack-type anomaly] hierarchy level | signature ...same statements as in [edit
security idp custom-attack attack-name attack-type signature] hierarchy level);
}
}
order;
protocol-binding {
application application-name;
icmp;
icmpv6;
ip {
protocol-number transport-layer-protocol-number;
}
ipv6 {
protocol-number transport-layer-protocol-number;
}
nested-application nested-application-name;
rpc {
program-number rpc-program-number;
}
tcp {
minimum-port port-number <maximum-port port-number>;
}
udp {
minimum-port port-number <maximum-port port-number>;
}
}
reset;
scope (session | transaction);
}
}
[edit security idp custom-attack attack-name]
Options
128
Required Privilege
Level
Related
Documentation
129
130
attack-type {
anomaly {
direction (any | client-to-server | server-to-client);
shellcode (all | intel |no-shellcode | sparc);
test-condition condition-name;
}
signature {
context context-name;
direction (any | client-to-server | server-to-client);
negate;
pattern signature-pattern;
protocol {
icmp {
code {
match (equal | greater-than | less-than | not-equal);
value code-value;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
type {
match (equal | greater-than | less-than | not-equal);
value type-value;
}
}
ipv4 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
ip-flags {
(df | no-df);
(mf | no-mf);
(rb | no-rb);
}
protocol {
match (equal | greater-than | less-than | not-equal);
value transport-layer-protocol-id;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
tos {
match (equal | greater-than | less-than | not-equal);
value type-of-service-in-decimal;
}
total-length {
match (equal | greater-than | less-than | not-equal);
value total-length-of-ip-datagram;
}
ttl {
match (equal | greater-than | less-than | not-equal);
value time-to-live;
}
}
ipv6 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
flow-label {
match (equal | greater-than | less-than | not-equal);
value flow-label-value;
}
hop-limit {
match (equal | greater-than | less-than | not-equal);
value hop-limit-value;
}
next-header {
match (equal | greater-than | less-than | not-equal);
value next-header-value;
}
payload-length {
match (equal | greater-than | less-than | not-equal);
value payload-length-value;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
traffic-class {
match (equal | greater-than | less-than | not-equal);
value traffic-class-value;
}
tcp {
ack-number {
match (equal | greater-than | less-than | not-equal);
value acknowledgement-number;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value tcp-data-length;
}
destination-port {
131
132
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
133
134
attack-type {
signature {
context context-name;
direction (any | client-to-server | server-to-client);
negate;
pattern signature-pattern;
protocol {
icmp {
code {
match (equal | greater-than | less-than | not-equal);
value code-value;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
type {
match (equal | greater-than | less-than | not-equal);
value type-value;
}
}
ipv4 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
ip-flags {
(df | no-df);
(mf | no-mf);
(rb | no-rb);
}
protocol {
match (equal | greater-than | less-than | not-equal);
value transport-layer-protocol-id;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
tos {
135
value header-length;
}
mss {
match (equal | greater-than | less-than | not-equal);
value maximum-segment-size;
}
option {
match (equal | greater-than | less-than | not-equal);
value tcp-option;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
tcp-flags {
(ack | no-ack);
(fin | no-fin);
(psh | no-psh);
(r1 | no-r1);
(r2 | no-r2);
(rst | no-rst);
(syn | no-syn);
(urg | no-urg);
}
urgent-pointer {
match (equal | greater-than | less-than | not-equal);
value urgent-pointer;
}
window-scale {
match (equal | greater-than | less-than | not-equal);
value window-scale-factor;
}
window-size {
match (equal | greater-than | less-than | not-equal);
value window-size;
}
}
udp {
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
}
}
136
protocol-binding {
application application-name;
icmp;
icmpv6;
ip {
protocol-number transport-layer-protocol-number;
}
ipv6 {
protocol-number transport-layer-protocol-number;
}
nested-application nested-application-name;
rpc {
program-number rpc-program-number;
}
tcp {
minimum-port port-number <maximum-port port-number>;
}
udp {
minimum-port port-number <maximum-port port-number>;
}
}
regexp regular-expression;
shellcode (all | intel | no-shellcode | sparc);
}
}
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
137
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
138
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
[edit security idp idp-policy policy-name rulebase-ips rule rule-name match]
automatic (Security)
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
automatic {
download-timeout minutes;
enable;
interval hours;
start-time start-time;
}
[edit security idp security-package]
cache-size (Security)
Syntax
Hierarchy Level
cache-size size;
[edit security idp sensor-configuration log]
Release Information
Description
Options
sizeCache size.
139
Hierarchy Level
Release Information
Description
Options
category {
values [category-value];
}
[edit security idp dynamic-attack-group dynamic-attack-group-name filters]
140
chain
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
chain {
expression boolean-expression;
member member-name {
attack-type {
(anomaly ...same statements as in [edit security idp custom-attack attack-name
attack-type anomaly] hierarchy level | signature ...same statements as in [edit security
idp custom-attack attack-name attack-type signature] hierarchy level);
}
}
order;
protocol-binding {
application application-name;
icmp;
icmpv6;
ip {
protocol-number transport-layer-protocol-number;
}
ipv6 {
protocol-number transport-layer-protocol-number;
}
nested-application nested-application-name;
rpc {
program-number rpc-program-number;
}
tcp {
minimum-port port-number <maximum-port port-number>;
}
udp {
minimum-port port-number <maximum-port port-number>;
}
}
reset;
scope (session | transaction);
}
[edit security idp custom-attack attack-name attack-type]
141
code
Syntax
Hierarchy Level
Release Information
Description
Options
code {
match (equal | greater-than | less-than | not-equal);
value code-value;
}
[edit security idp custom-attack attack-name attack-type signature protocol icmp]
Options
Required Privilege
Level
Related
Documentation
142
context context-name;
[edit security idp custom-attack attack-name attack-type signature]
content-decompression-max-memory-kb
Syntax
Hierarchy Level
Release Information
Description
content-decompression-max-memory-kb value;
[edit security idp sensor-configuration ips]
Options
Required Privilege
Level
Related
Documentation
143
content-decompression-max-ratio
Syntax
Hierarchy Level
Release Information
Description
content-decompression-max-ratio value;
[edit security idp sensor-configuration ips]
Options
Required Privilege
Level
Related
Documentation
Options
Required Privilege
Level
Related
Documentation
144
count count-value;
[edit security idp custom-attack attack-name time-binding]
custom-attack
Syntax
custom-attack attack-name {
attack-type {
anomaly {
direction (any | client-to-server | server-to-client);
service service-name;
shellcode (all | intel | no-shellcode | sparc);
test test-condition;
}
chain {
expression boolean-expression;
member member-name {
attack-type {
(anomaly ...same statements as in [edit security idp custom-attack attack-name
attack-type anomaly] hierarchy level | signature ...same statements as in [edit
security idp custom-attack attack-name attack-type signature] hierarchy level);
}
}
order;
protocol-binding {
application application-name;
icmp;
icmpv6;
ip {
protocol-number transport-layer-protocol-number;
}
ipv6 {
protocol-number transport-layer-protocol-number;
}
nested-application nested-application-name;
rpc {
program-number rpc-program-number;
}
tcp {
minimum-port port-number <maximum-port port-number>;
}
udp {
minimum-port port-number <maximum-port port-number>;
}
}
reset;
scope (session | transaction);
}
signature {
context context-name;
direction (any | client-to-server | server-to-client);
negate;
pattern signature-pattern;
protocol {
icmp {
code {
match (equal | greater-than | less-than | not-equal);
value code-value;
145
}
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
type {
match (equal | greater-than | less-than | not-equal);
value type-value;
}
}
ipv4 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
ip-flags {
(df | no-df);
(mf | no-mf);
(rb | no-rb);
}
protocol {
match (equal | greater-than | less-than | not-equal);
value transport-layer-protocol-id;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
tos {
match (equal | greater-than | less-than | not-equal);
value type-of-service-in-decimal;
}
total-length {
match (equal | greater-than | less-than | not-equal);
value total-length-of-ip-datagram;
}
ttl {
match (equal | greater-than | less-than | not-equal);
value time-to-live;
}
}
ipv6 {
destination {
match (equal | greater-than | less-than | not-equal);
146
value ip-address-or-hostname;
}
flow-label {
match (equal | greater-than | less-than | not-equal);
value flow-label-value;
}
hop-limit {
match (equal | greater-than | less-than | not-equal);
value hop-limit-value;
}
next-header {
match (equal | greater-than | less-than | not-equal);
value next-header-value;
}
payload-length {
match (equal | greater-than | less-than | not-equal);
value payload-length-value;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
traffic-class {
match (equal | greater-than | less-than | not-equal);
value traffic-class-value;
}
tcp {
ack-number {
match (equal | greater-than | less-than | not-equal);
value acknowledgement-number;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value tcp-data-length;
}
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
header-length {
match (equal | greater-than | less-than | not-equal);
value header-length;
}
mss {
match (equal | greater-than | less-than | not-equal);
value maximum-segment-size;
}
option {
match (equal | greater-than | less-than | not-equal);
value tcp-option;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
source-port {
147
148
Hierarchy Level
Release Information
Description
Options
149
custom-attack-group
Syntax
Hierarchy Level
Release Information
Description
Options
custom-attack-group custom-attack-group-name {
group-members [attack-or-attack-group-name];
}
[edit security idp]
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
150
custom-attack-groups attack-group-name;
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match attacks]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name match attacks]
custom-attacks
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
custom-attacks [attack-name];
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match attacks],
[edit security idp idp-policy policy-name rulebase-ips rule rule-name match attacks]
data-length
Syntax
Hierarchy Level
Release Information
Description
Options
data-length {
match (equal | greater-than | less-than | not-equal);
value tcp-data-length;
}
[edit security idp custom-attack attack-name attack-type signature protocol udp]
[edit security idp custom-attack attack-name attack-type signature protocol icmp]
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
151
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
description text;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name]
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name]
Statement modified in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Specify descriptive text for an exempt rule, or IPS rule.
textDescriptive text about an exempt rule, or IPS rule.
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
152
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
[edit security idp custom-attack attack-name attack-type signature protocol ipv4]
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Specify a destination IP address or IP address set object to be used as the match
destination address object. The default value is any.
address-nameIP address or IP address set object.
destination-except
Syntax
Hierarchy Level
destination-except [address-name];
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name match]
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name match]
Release Information
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Description
Specify a destination IP address or IP address set object to specify all destination address
objects except the specified address objects. The default value is any.
Options
Required Privilege
Level
Related
Documentation
153
Hierarchy Level
Release Information
Description
Options
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
[edit security idp custom-attack attack-name attack-type signature protocol udp]
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
detect-shellcode
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
154
(detect-shellcode | no-detect-shellcode);
[edit security idp sensor-configuration ips]
detector
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
detector {
protocol-name protocol-name {
tunable-name tunable-name {
tunable-value protocol-value;
}
}
}
[edit security idp sensor-configuration]
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
155
Hierarchy Level
Release Information
Description
Options
direction {
expression (and | or);
values [any client-to-server exclude-any exclude-client-to-server exclude-server-to-client
server-to-client];
}
[edit security idp dynamic-attack-group dynamic-attack-group-name filters]
Statement introduced in Release 9.3 of Junos OS. The expression option added in Release
11.4 of Junos OS.
Specify a direction filter to add predefined attacks to the dynamic group based on the
direction specified in the attacks.
expressionBoolean operators:
and If both the member name patterns match, the expression matches.
valuesName of the direction filter. You can select from the following directions:
Required Privilege
Level
Related
Documentation
156
download-timeout
Syntax
Hierarchy Level
Release Information
Description
download-timeout minutes;
[edit security idp security-package automatic]
Options
minutesTime in minutes.
NOTE: For SRX Series devices the applicable range is 1 through 4000000
per second.
Required Privilege
Level
Related
Documentation
157
dynamic-attack-group
Syntax
Hierarchy Level
Release Information
Description
Options
dynamic-attack-group dynamic-attack-group-name {
filters {
category {
values [category-value];
}
direction {
expression (and | or);
values [any client-to-server exclude-any exclude-client-to-server
exclude-server-to-client server-to-client];
}
false-positives {
values [frequently occasionally rarely unknown];
}
performance {
values [fast normal slow unknown];
}
products {
values [product-value];
}
recommended;
service {
values [service-value];
}
severity {
values [critical info major minor warning];
}
type {
values [anomaly signature];
}
}
}
[edit security idp]
Statement introduced in Release 9.3 of Junos OS. The expression option added in Release
11.4 of Junos OS.
Configure a dynamic attack group. A dynamic attack group selects its members based
on the filters specified in the group. Therefore, the list of attacks is updated (added or
removed) when a new signature database is used.
dynamic-attack-group-nameName of the dynamic attack group.
158
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
dynamic-attack-groups attack-group-name;
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match attacks]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name match attacks]
enable-all-qmodules
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
(enable-all-qmodules | no-enable-all-qmodules);
[edit security idp sensor-configuration global]
159
enable-packet-pool
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
(enable-packet-pool | no-enable-packet-pool);
[edit security idp sensor-configuration global]
expression
Syntax
Hierarchy Level
Release Information
Description
expression boolean-expression;
[edit security idp custom-attack attack-name attack-type chain]
Options
boolean-expressionBoolean operators:
orIf either of the member name patterns match, the expression matches.
andIf both of the member name patterns match, the expression matches. It does
oandIf both of the member name patterns match, and if they appear in the same
160
false-positives
Syntax
Hierarchy Level
Release Information
Description
Options
false-positives {
values [frequently occasionally rarely unknown];
}
[edit security idp dynamic-attack-group dynamic-attack-group-name filters]
frequency:
unknownBy default, all compound attack objects are set to Unknown. As you fine-tune
IDP to your network traffic, you can change this setting to help you track false positives.
Required Privilege
Level
Related
Documentation
fifo-max-size (IPS)
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
fifo-max-size value;
[edit security idp sensor-configuration ips]
161
162
fifo-max-size value;
[edit security idp sensor-configuration flow]
filters
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
filters {
category {
values [category-value];
}
direction {
expression (and | or);
values [any client-to-server exclude-any exclude-client-to-server exclude-server-to-client
server-to-client];
}
false-positives {
values [frequently occasionally rarely unknown];
}
performance {
values [fast normal slow unknown];
}
products {
values [product-value];
}
recommended;
service {
values [service-value];
}
severity {
values [critical info major minor warning];
}
type {
values [anomaly signature];
}
}
[edit security idp dynamic-attack-group dynamic-attack-group-name]
Statement introduced in Release 9.3 of Junos OS. The expression option added in Release
11.4 of Junos OS.
To create a dynamic attack group, set the criteria using different types of filters.
The remaining statements are explained separately.
securityTo view this statement in the configuration.
security-controlTo add this statement to the configuration.
163
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
flow {
(allow-icmp-without-flow | no-allow-icmp-without-flow);
fifo-max-size value;
hash-table-size value;
(log-errors | no-log-errors);
max-timers-poll-ticks value;
reject-timeout value;
(reset-on-policy | no-reset-on-policy);
udp-anticipated-timeout value;
}
[edit security idp sensor-configuration]
Release Information
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Junos OS 10.0.
Description
Specify a source zone to be associated with the security policy. The default value is any.
Options
Required Privilege
Level
Related
Documentation
164
forwarding-process
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
forwarding-process {
application-services {
maximize-alg-sessions;
maximize-cp-sessions;
maximize-idp-sessions {
inline-tap;
weight (equal | firewall | idp);
}
session-distribution-mode {
hash-based;
}
}
}
[edit security]
165
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
global {
(enable-all-qmodules | no-enable-all-qmodules);
(enable-packet-pool | no-enable-packet-pool);
gtp (decapsulation | no-decapsulation);
memory-limit-percent value;
(policy-lookup-cache | no-policy-lookup-cache);
}
[edit security idp sensor-configuration]
group-members
Syntax
Hierarchy Level
Release Information
Description
group-members [attack-or-attack-group-name];
[edit security idp custom-attack-group custom-attack-group-name]
Options
Required Privilege
Level
Related
Documentation
166
To define a specific set of attacks to which you know your network is vulnerable.
To define a specific set of informational attack objects that you use to keep you aware
of what is happening on your network.
hash-table-size value;
[edit security idp sensor-configuration flow]
header-length
Syntax
Hierarchy Level
Release Information
Description
Options
header-length {
match (equal | greater-than | less-than | not-equal);
value header-length;
}
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
167
Hierarchy Level
Release Information
high-availability {
no-policy-cold-synchronization;
}
[edit security idp sensor-configuration]
Description
Options
Required Privilege
Level
Related
Documentation
icmp;
[edit security idp custom-attack attack-name attack-type chain protocol-binding]
[edit security idp custom-attack attack-name attack-type signature protocol-binding]
Release Information
Description
Required Privilege
Level
Related
Documentation
168
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
icmp {
code {
match (equal | greater-than | less-than | not-equal);
value code-value;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
type {
match (equal | greater-than | less-than | not-equal);
value type-value;
}
}
[edit security idp custom-attack attack-name attack-type signature protocol]
169
Release Information
Description
Required Privilege
Level
Related
Documentation
icmpv6;
[edit security idp custom-attack attack-name attack-type chain protocol-binding]
[edit security idp custom-attack attack-name attack-type signature protocol-binding]
Hierarchy Level
Release Information
Description
Options
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
[edit security idp custom-attack attack-name attack-type signature protocol icmp]
170
Hierarchy Level
Release Information
Description
Options
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
[edit security idp custom-attack attack-name attack-type signature protocol ipv4]
171
idp-policy
Syntax
172
idp-policy policy-name {
rulebase-ddos {
rule rule-name {
description text;
match {
application (application-name | any | default);
application-ddos <application-name>;
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any);
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
then {
action {
(close-server | drop-connection | drop-packet | no-action);
}
ip-action {
(ip-block | ip-close | ip-connection-rate-limit connections-per-second | ip-notify);
log;
log-create;
refresh-timeout;
timeout seconds;
}
notification {
log-attacks {
alert;
}
}
}
}
}
rulebase-exempt {
rule rule-name {
description text;
match {
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any );
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
}
}
rulebase-ips {
rule rule-name {
description text;
match {
application (application-name | any | default);
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any );
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
terminal;
then {
action {
class-of-service {
dscp-code-point number;
forwarding-class forwarding-class;
}
(close-client | close-client-and-server | close-server |drop-connection | drop-packet
| ignore-connection | mark-diffserv value | no-action | recommended);
}
ip-action {
(ip-block | ip-close | ip-notify);
log;
log-create;
refresh-timeout;
target (destination-address | service | source-address | source-zone |
source-zone-address | zone-service);
timeout seconds;
}
notification {
log-attacks {
alert;
}
packet-log {
post-attack number;
post-attack-timeout seconds;
pre-attack number;
}
}
severity (critical | info | major | minor | warning);
}
}
}
}
173
Hierarchy Level
Release Information
Description
Options
idp-policy
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
idp-policy idp-policy-name;
[edit system security-profile security-profile-name]
ignore-memory-overflow
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
174
(ignore-memory-overflow | no-ignore-memory-overflow);
[edit security idp sensor-configuration re-assembler]
ignore-reassembly-overflow
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
ignore-reassembly-overflow
[edit security idp sensor-configuration re-assembler]
ignore-regular-expression
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
(ignore-regular-expression | no-ignore-regular-expression);
[edit security idp sensor-configuration ips]
175
include-destination-address
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
(include-destination-address | no-include-destination-address);
[edit security idp sensor-configuration log suppression]
inline-tap
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
176
inline-tap;
[edit security forwarding-process application-services maximize-idp-sessions]
Options
interval hours;
[edit security idp security-package automatic]
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
ip-action {
(ip-block | ip-close | ip-connection-rate-limit connections-per-second | ip-notify);
log;
log-create;
refresh-timeout;
timeout seconds;
}
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then]
177
Hierarchy Level
Release Information
Description
Options
ip-action {
(ip-block | ip-close | ip-notify);
log;
log-create;
refresh-timeout;
target (destination-address | service | source-address | source-zone | source-zone-address
| zone-service);
timeout seconds;
}
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then]
NOTE: For ICMP flows, the destination port is 0; therefore, any ICMP flow
matching source port, source address, and destination address is blocked.
Required Privilege
Level
Related
Documentation
178
ip-block
Syntax
Hierarchy Level
ip-block;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then ip-action]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then ip-action]
Release Information
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Description
Block future connections of any session that matches the IP action. If there is an IP action
match with multiple rules, then the most severe IP action of all the matched rules is
applied. The highest IP action priority (that is, the most severe action) is Drop/Block,
then Close, then Notify.
Required Privilege
Level
Related
Documentation
ip-close
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
ip-close;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then ip-action]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then ip-action]
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Close future connections of any new sessions that match the IP action by sending RST
packets to the client and server.
securityTo view this statement in the configuration.
security-controlTo add this statement to the configuration.
179
ip-connection-rate-limit
Syntax
Hierarchy Level
Release Information
Description
Options
ip-connection-rate-limit connections-per-second;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then ip-action]
ip-flags
Syntax
Hierarchy Level
Release Information
Description
Options
ip-flags {
(df | no-df);
(mf | no-mf);
(rb | no-rb);
}
[edit security idp custom-attack attack-name attack-type signature protocol ipv4]
df | no-dfWhen set, the df (Dont Fragment) indicates that the packet cannot be
fragmented for transmission. When unset, it indicates that the packet can be
fragmented.
mf | no-mfWhen set, the mf (More Fragments) indicates that the packet contains
Required Privilege
Level
Related
Documentation
180
rb | no-rbWhen set, the rb (Reserved Bit) indicates that the bit is reserved.
ip-notify
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
ip-notify;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then ip-action]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then ip-action]
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Do not take any action against future traffic, but do log the event.
securityTo view this statement in the configuration.
security-controlTo add this statement to the configuration.
ips
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
ips {
content-decompression-max-memory-kb value;
content-decompression-max-ratio value;
(detect-shellcode | no-detect-shellcode);
fifo-max-size value;
(ignore-regular-expression | no-ignore-regular-expression);
log-supercede-min minimum-value;
pre-filter-shellcode;
(process-ignore-s2c | no-process-ignore-s2c);
(process-override | no-process-override);
process-port port-number;
}
[edit security idp sensor-configuration]
181
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
182
ipv4 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
ip-flags {
(df | no-df);
(mf | no-mf);
(rb | no-rb);
}
protocol {
match (equal | greater-than | less-than | not-equal);
value transport-layer-protocol-id;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
tos {
match (equal | greater-than | less-than | not-equal);
value type-of-service-in-decimal;
}
total-length {
match (equal | greater-than | less-than | not-equal);
value total-length-of-ip-datagram;
}
ttl {
match (equal | greater-than | less-than | not-equal);
value time-to-live;
}
}
[edit security idp custom-attack attack-name attack-type signature protocol]
Release Information
Description
Required Privilege
Level
Related
Documentation
ipv6;
[edit security idp custom-attack attack-name attack-type chain protocol-binding]
[edit security idp custom-attack attack-name attack-type signature protocol-binding]
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
log {
cache-size size;
suppression {
disable;
(include-destination-address | no-include-destination-address);
max-logs-operate value;
max-time-report value;
start-log value;
}
}
[edit security idp sensor-configuration]
183
Release Information
Description
Required Privilege
Level
Related
Documentation
log;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then ip-action]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then ip-action]
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Log the information about the IP action against the traffic that matches a rule.
securityTo view this statement in the configuration.
security-controlTo add this statement to the configuration.
log-attacks
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
184
log-attacks {
alert;
}
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then notification]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then notification]
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Enable the log attacks to create a log record that appears in the log viewer.
The remaining statements are explained separately.
securityTo view this statement in the configuration.
security-controlTo add this statement to the configuration.
log-create
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
log-create;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then ip-action]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then ip-action]
log-errors
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
(log-errors | no-log-errors);
[edit security idp sensor-configuration flow]
185
log-supercede-min
Syntax
Hierarchy Level
Release Information
Description
Options
log-supercede-min minimum-value;
[edit security idp sensor-configuration ips]
186
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
match {
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any );
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name]
187
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
match {
application (application-name | any | default);
application-ddos <application-name>;
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any);
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name]
max-flow-mem
Syntax
Hierarchy Level
Release Information
Description
Options
max-flow-mem value;
[edit security idp sensor-configuration re-assembler]
188
max-logs-operate
Syntax
Hierarchy Level
Release Information
Description
Options
max-logs-operate value;
[edit security idp sensor-configuration log suppression]
max-packet-mem
Syntax
Hierarchy Level
Release Information
Description
Options
max-packet-mem value;
[edit security idp sensor-configuration re-assembler]
189
max-packet-memory
Syntax
Hierarchy Level
Release Information
Description
Options
max-packet-memory value;
[edit security idp sensor-configuration application-identification]
Options
max-sessions percentage;
[edit security idp sensor-configuration packet-log]
190
max-tcp-session-packet-memory
Syntax
Hierarchy Level
Release Information
Description
Options
max-tcp-session-packet-memory value;
[edit security idp sensor-configuration application-identification]
max-time-report
Syntax
Hierarchy Level
Release Information
Description
Options
max-time-report value;
[edit security idp sensor-configuration log suppression]
191
max-timers-poll-ticks
Syntax
Hierarchy Level
Release Information
Description
Options
max-timers-poll-ticks value;
[edit security idp sensor-configuration flow]
max-udp-session-packet-memory
Syntax
Hierarchy Level
Release Information
Description
Options
max-udp-session-packet-memory value;
[edit security idp sensor-configuration application-identification]
192
maximize-idp-sessions
Syntax
Hierarchy Level
Release Information
Description
maximize-idp-sessions {
inline-tap;
weight (equal | firewall | idp);
}
[edit security forwarding-process application-services]
NOTE: The IDP session capacity is restricted to 100000 sessions per SPU.
Options
Required Privilege
Level
Related
Documentation
193
Hierarchy Level
Release Information
Description
Options
member member-name {
attack-type {
(anomaly ...same statements as in [edit security idp custom-attack attack-name
attack-type anomaly] hierarchy level | signature ...same statements as in [edit security
idp custom-attack attack-name attack-type signature] hierarchy level);
}
}
[edit security idp custom-attack attack-name attack-type chain]
Hierarchy Level
Release Information
Description
Options
mss {
match (equal | greater-than | less-than | not-equal);
value maximum-segment-size;
}
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
194
negate
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
negate;
[edit security idp custom-attack attack-name attack-type signature]
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
nested-application nested-application-name;
[edit security idp custom-attack attack-name attack-type chain protocol-binding]
[edit security idp custom-attack attack-name attack-type signature protocol-binding]
195
notification
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
196
notification {
log-attacks {
alert;
}
packet-log {
post-attack number;
post-attack-timeout seconds;
pre-attack number;
}
}
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then]
Statement introduced in Release 9.2 of Junos OS. Added packet capture support in
Release 10.2 of Junos OS.
Configure the logging options against the action. When attacks are detected, you can
choose to log an attack and create log records with attack information and send that
information to the log server.
The remaining statements are explained separately.
securityTo view this statement in the configuration.
security-controlTo add this statement to the configuration.
Hierarchy Level
Release Information
Description
Options
option {
match (equal | greater-than | less-than | not-equal);
value tcp-option;
}
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
Required Privilege
Level
Related
Documentation
order;
[edit security idp custom-attack attack-name attack-type chain]
197
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
198
packet-log {
post-attack number;
post-attack-timeout seconds;
pre-attack number;
}
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then notification]
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
packet-log {
host ip-address <port number>;
max-sessions percentage;
source-address ip-address;
total-memory percentage;
}
[edit security idp sensor-configuration]
Options
Required Privilege
Level
Related
Documentation
pattern signature-pattern;
[edit security idp custom-attack attack-name attack-type signature]
199
performance
Syntax
Hierarchy Level
Release Information
Description
Options
performance {
values [fast normal slow unknown];
}
[edit security idp dynamic-attack-group dynamic-attack-group-name filters]
level:
unknownBy default, all compound attack objects are set to Unknown. As you fine-tune
IDP to your network traffic, you can change this setting to help you track performance
level.
Required Privilege
Level
Related
Documentation
policy-lookup-cache
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
200
(policy-lookup-cache | no-policy-lookup-cache);
[edit security idp sensor-configuration global]
post-attack
Syntax
Hierarchy Level
Release Information
Description
Options
post-attack number;
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then notification
packet-log]
post-attack-timeout
Syntax
Hierarchy Level
Release Information
Description
Options
post-attack-timeout seconds;
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then notification
packet-log]
201
pre-attack
Syntax
Hierarchy Level
Release Information
Description
Options
pre-attack number;
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then notification
packet-log]
pre-filter-shellcode
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
202
pre-filter-shellcode;
[edit security idp sensor-configuration ips]
predefined-attack-groups
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
predefined-attack-groups [attack-group-name];
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match attacks],
[edit security idp idp-policy policy-name rulebase-ips rule rule-name match attacks]
predefined-attacks
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
predefined-attacks [attack-name];
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match attacks],
[edit security idp idp-policy policy-name rulebase-ips rule rule-name match attacks]
203
process-ignore-s2c
Syntax
Hierarchy Level
Release Information
(process-ignore-s2c | no-process-ignore-s2c);
[edit security idp sensor-configuration ips]
Description
Required Privilege
Level
Related
Documentation
process-override
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
204
(process-override | no-process-override);
[edit security idp sensor-configuration ips]
process-port
Syntax
Hierarchy Level
Release Information
Description
Options
process-port port-number;
[edit security idp sensor-configuration ips]
products
Syntax
Hierarchy Level
Release Information
Description
Options
products {
values [product-value];
}
[edit security idp dynamic-attack-group dynamic-attack-group-name filters]
205
protocol-binding
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
206
protocol-binding {
application application-name;
icmp;
icmpv6;
ip {
protocol-number transport-layer-protocol-number;
}
ipv6 {
protocol-number transport-layer-protocol-number;
}
nested-application nested-application-name;
rpc {
program-number rpc-program-number;
}
tcp {
minimum-port port-number <maximum-port port-number>;
}
udp {
minimum-port port-number <maximum-port port-number>;
}
}
[edit security idp custom-attack attack-name attack-type chain]
[edit security idp custom-attack attack-name attack-type signature]
protocol-name
Syntax
Hierarchy Level
protocol-name protocol-name {
tunable-name tunable-name {
tunable-value protocol-value;
}
}
[edit security idp sensor-configuration detector]
Release Information
Statement introduced in Release 9.2 of Junos OS. Support for file format decoding over
HTTP using MIME added in Release 11.2 of Junos OS.
Description
Specify the name of the protocol to be used to configure each of the protocol detector
engines.
Options
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
protocol {
match (equal | greater-than | less-than | not-equal);
value transport-layer-protocol-id;
}
[edit security idp custom-attack attack-name attack-type signature protocol ipv4]
207
208
protocol {
icmp {
code {
match (equal | greater-than | less-than | not-equal);
value code-value;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
type {
match (equal | greater-than | less-than | not-equal);
value type-value;
}
}
ipv4 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
ip-flags {
(df | no-df);
(mf | no-mf);
(rb | no-rb);
}
protocol {
match (equal | greater-than | less-than | not-equal);
value transport-layer-protocol-id;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
tos {
match (equal | greater-than | less-than | not-equal);
value type-of-service-in-decimal;
}
total-length {
match (equal | greater-than | less-than | not-equal);
value total-length-of-ip-datagram;
}
ttl {
match (equal | greater-than | less-than | not-equal);
value time-to-live;
}
}
ipv6 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
flow-label {
match (equal | greater-than | less-than | not-equal);
value flow-label-value;
}
hop-limit {
match (equal | greater-than | less-than | not-equal);
value hop-limit-value;
}
next-header {
match (equal | greater-than | less-than | not-equal);
value next-header-value;
}
payload-length {
match (equal | greater-than | less-than | not-equal);
value payload-length-value;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
traffic-class {
match (equal | greater-than | less-than | not-equal);
value traffic-class-value;
}
tcp {
ack-number {
match (equal | greater-than | less-than | not-equal);
value acknowledgement-number;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value tcp-data-length;
}
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
header-length {
match (equal | greater-than | less-than | not-equal);
value header-length;
}
mss {
match (equal | greater-than | less-than | not-equal);
value maximum-segment-size;
}
209
option {
match (equal | greater-than | less-than | not-equal);
value tcp-option;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
tcp-flags {
(ack | no-ack);
(fin | no-fin);
(psh | no-psh);
(r1 | no-r1);
(r2 | no-r2);
(rst | no-rst);
(syn | no-syn);
(urg | no-urg);
}
urgent-pointer {
match (equal | greater-than | less-than | not-equal);
value urgent-pointer;
}
window-scale {
match (equal | greater-than | less-than | not-equal);
value window-scale-factor;
}
window-size {
match (equal | greater-than | less-than | not-equal);
value window-size;
}
}
udp {
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
}
}
Hierarchy Level
Release Information
Description
210
Options
Required Privilege
Level
Related
Documentation
re-assembler
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
re-assembler {
(ignore-memory-overflow | no-ignore-memory-overflow);
(ignore-reassembly-memory-overflow | no-ignore-reassembly-memory-overflow);
ignore-reassembly-overflow;
max-flow-mem value;
max-packet-mem value;
}
[edit security idp sensor-configuration]
211
recommended-action
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
dropDrop the particular packet and all subsequent packets of the flow.
refresh-timeout
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
212
refresh-timeout;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then ip-action]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then ip-action]
regexp
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
regexp regular-expression;
[edit security idp custom-attack attack-name attack-type signature]
reject-timeout
Syntax
Hierarchy Level
Release Information
Description
Options
reject-timeout value;
[edit security idp sensor-configuration flow]
213
Required Privilege
Level
Related
Documentation
reset;
[edit security idp custom-attack attack-name attack-type chain]
reset-on-policy
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
214
(reset-on-policy | no-reset-on-policy);
[edit security idp sensor-configuration flow]
rpc
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
rpc {
program-number rpc-program-number;
}
[edit security idp custom-attack attack-name attack-type chain protocol-binding]
[edit security idp custom-attack attack-name attack-type signature protocol-binding]
215
Hierarchy Level
Release Information
Description
Options
rule rule-name {
description text;
match {
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any );
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
}
[edit security idp idp-policy policy-name rulebase-exempt]
216
Hierarchy Level
Release Information
Description
Options
rule rule-name {
description text;
match {
application (application-name | any | default);
application-ddos <application-name>;
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any);
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
then {
action {
(close-server | drop-connection | drop-packet | no-action);
}
ip-action {
(ip-block | ip-close | ip-connection-rate-limit connections-per-second | ip-notify);
log;
log-create;
refresh-timeout;
timeout seconds;
}
notification {
log-attacks {
alert;
}
}
}
}
[edit security idp idp-policy policy-name rulebase-ddos]
217
Hierarchy Level
218
rule rule-name {
description text;
match {
application (application-name | any | default);
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any );
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
terminal;
then {
action {
class-of-service {
dscp-code-point number;
forwarding-class forwarding-class;
}
(close-client | close-client-and-server | close-server |drop-connection | drop-packet
| ignore-connection | mark-diffserv value | no-action | recommended);
}
ip-action {
(ip-block | ip-close | ip-notify);
log;
log-create;
refresh-timeout;
target (destination-address | service | source-address | source-zone |
source-zone-address | zone-service);
timeout seconds;
}
notification {
log-attacks {
alert;
}
packet-log {
post-attack number;
post-attack-timeout seconds;
pre-attack number;
}
}
severity (critical | info | major | minor | warning);
}
}
[edit security idp idp-policy policy-name rulebase-ips]
Release Information
Description
Options
219
rulebase-ddos
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
220
rulebase-ddos {
rule rule-name {
description text;
match {
application (application-name | any | default);
application-ddos <application-name>;
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any);
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
then {
action {
(close-server | drop-connection | drop-packet | no-action);
}
ip-action {
(ip-block | ip-close | ip-connection-rate-limit connections-per-second | ip-notify);
log;
log-create;
refresh-timeout;
timeout seconds;
}
notification {
log-attacks {
alert;
}
}
}
}
}
[edit security idp idp-policy policy-name]
rulebase-exempt
Syntax
Hierarchy Level
Release Information
Description
rulebase-exempt {
rule rule-name {
description text;
match {
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any );
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
}
}
[edit security idp idp-policy policy-name]
NOTE: You must configure the IPS rulebase before configuring the exempt
rulebase.
Options
Required Privilege
Level
Related
Documentation
221
rulebase-ips
Syntax
222
rulebase-ips {
rule rule-name {
description text;
match {
application (application-name | any | default);
attacks {
custom-attack-groups [attack-group-name];
custom-attacks [attack-name];
dynamic-attack-groups [attack-group-name];
predefined-attack-groups [attack-group-name];
predefined-attacks [attack-name];
}
destination-address ([address-name] | any | any-ipv4 | any-ipv6);
destination-except [address-name];
from-zone (zone-name | any );
source-address ([address-name] | any | any-ipv4 | any-ipv6);
source-except [address-name];
to-zone (zone-name | any);
}
terminal;
then {
action {
class-of-service {
dscp-code-point number;
forwarding-class forwarding-class;
}
(close-client | close-client-and-server | close-server |drop-connection | drop-packet
| ignore-connection | mark-diffserv value | no-action | recommended);
}
ip-action {
(ip-block | ip-close | ip-notify);
log;
log-create;
refresh-timeout;
target (destination-address | service | source-address | source-zone |
source-zone-address | zone-service);
timeout seconds;
}
notification {
log-attacks {
alert;
}
packet-log {
post-attack number;
post-attack-timeout seconds;
pre-attack number;
}
}
severity (critical | info | major | minor | warning);
}
}
}
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
Options
sessionAllow multiple matches for the object within the same session.
transactionMatch the object across multiple transactions that occur within the same
session.
Required Privilege
Level
Related
Documentation
223
Options
peerIDP detects attacks between source and destination IP addresses of the sessions
sourceIDP detects attacks from a given source IP address for the specified number
224
security-package
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
security-package {
automatic {
download-timeout minutes;
enable;
interval hours;
start-time start-time;
}
install {
ignore-version-check;
}
source-address address;
url url-name;
}
[edit security idp]
225
sensor-configuration
Syntax
226
sensor-configuration {
application-ddos {
statistics {
interval minutes;
}
}
application-identification {
max-packet-memory value;
max-tcp-session-packet-memory value;
max-udp-session-packet-memory value;
}
detector {
protocol-name protocol-name {
tunable-name tunable-name {
tunable-value protocol-value;
}
}
}
flow {
(allow-icmp-without-flow | no-allow-icmp-without-flow);
fifo-max-size value;
hash-table-size value;
(log-errors | no-log-errors);
max-timers-poll-ticks value;
reject-timeout value;
(reset-on-policy | no-reset-on-policy);
udp-anticipated-timeout value;
}
global {
(enable-all-qmodules | no-enable-all-qmodules);
(enable-packet-pool | no-enable-packet-pool);
gtp (decapsulation | no-decapsulation);
memory-limit-percent value;
(policy-lookup-cache | no-policy-lookup-cache);
}
high-availability {
no-policy-cold-synchronization;
}
ips {
content-decompression-max-memory-kb value;
content-decompression-max-ratio value;
(detect-shellcode | no-detect-shellcode);
fifo-max-size value;
(ignore-regular-expression | no-ignore-regular-expression);
log-supercede-min minimum-value;
pre-filter-shellcode;
(process-ignore-s2c | no-process-ignore-s2c);
(process-override | no-process-override);
process-port port-number;
}
log {
cache-size size;
suppression {
disable;
(include-destination-address | no-include-destination-address);
max-logs-operate value;
max-time-report value;
start-log value;
}
}
packet-log {
host ip-address <port number>;
max-sessions percentage;
source-address ip-address;
total-memory percentage;
}
re-assembler {
(ignore-memory-overflow | no-ignore-memory-overflow);
(ignore-reassembly-memory-overflow | no-ignore-reassembly-memory-overflow);
ignore-reassembly-overflow;
max-flow-mem value;
max-packet-mem value;
}
ssl-inspection {
cache-prune-chunk-size number;
key-protection;
maximum-cache-size number;
session-id-cache-timeout seconds;
sessions number;
}
}
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
227
Hierarchy Level
Release Information
Description
Options
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
[edit security idp custom-attack attack-name attack-type signature protocol icmp]
Hierarchy Level
Release Information
Description
Options
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
228
Options
Required Privilege
Level
Related
Documentation
service service-name;
[edit security idp custom-attack attack-name attack-type anomaly]
Hierarchy Level
Release Information
Description
Options
service {
values [service-value];
}
[edit security idp dynamic-attack-group dynamic-attack-group-name filters]
229
sessions
Syntax
Hierarchy Level
Release Information
Description
Options
sessions number;
[edit security idp sensor-configuration ssl-inspection]
230
infoContains attack objects matching normal, harmless traffic containing URLs, DNS
lookup failures, SNMP public community strings, and Peer-to-Peer (P2P) parameters.
You can use informational attack objects to obtain information about your network.
gain user-level access to a network device, or activate a Trojan horse previously loaded
on a device.
231
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
232
severity {
values [critical info major minor warning];
}
[edit security idp dynamic-attack-group dynamic-attack-group-name filters]
Options
Required Privilege
Level
Related
Documentation
critical2
info3
major4
minor5
warning7
233
shellcode
Syntax
Hierarchy Level
Release Information
Description
Options
Default: Basic shellcode checks will be performed when this field is not configured.
Required Privilege
Level
Related
Documentation
234
signature {
context context-name;
direction (any | client-to-server | server-to-client);
negate;
pattern signature-pattern;
protocol {
icmp {
code {
match (equal | greater-than | less-than | not-equal);
value code-value;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
type {
match (equal | greater-than | less-than | not-equal);
value type-value;
}
}
ipv4 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
identification {
match (equal | greater-than | less-than | not-equal);
value identification-value;
}
ip-flags {
(df | no-df);
(mf | no-mf);
(rb | no-rb);
}
protocol {
match (equal | greater-than | less-than | not-equal);
value transport-layer-protocol-id;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
tos {
match (equal | greater-than | less-than | not-equal);
235
value type-of-service-in-decimal;
}
total-length {
match (equal | greater-than | less-than | not-equal);
value total-length-of-ip-datagram;
}
ttl {
match (equal | greater-than | less-than | not-equal);
value time-to-live;
}
}
ipv6 {
destination {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
flow-label {
match (equal | greater-than | less-than | not-equal);
value flow-label-value;
}
hop-limit {
match (equal | greater-than | less-than | not-equal);
value hop-limit-value;
}
next-header {
match (equal | greater-than | less-than | not-equal);
value next-header-value;
}
payload-length {
match (equal | greater-than | less-than | not-equal);
value payload-length-value;
}
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
traffic-class {
match (equal | greater-than | less-than | not-equal);
value traffic-class-value;
}
tcp {
ack-number {
match (equal | greater-than | less-than | not-equal);
value acknowledgement-number;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value tcp-data-length;
}
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
header-length {
match (equal | greater-than | less-than | not-equal);
value header-length;
236
}
mss {
match (equal | greater-than | less-than | not-equal);
value maximum-segment-size;
}
option {
match (equal | greater-than | less-than | not-equal);
value tcp-option;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
tcp-flags {
(ack | no-ack);
(fin | no-fin);
(psh | no-psh);
(r1 | no-r1);
(r2 | no-r2);
(rst | no-rst);
(syn | no-syn);
(urg | no-urg);
}
urgent-pointer {
match (equal | greater-than | less-than | not-equal);
value urgent-pointer;
}
window-scale {
match (equal | greater-than | less-than | not-equal);
value window-scale-factor;
}
window-size {
match (equal | greater-than | less-than | not-equal);
value window-size;
}
}
udp {
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
}
}
protocol-binding {
237
application application-name;
icmp;
icmpv6;
ip {
protocol-number transport-layer-protocol-number;
}
ipv6 {
protocol-number transport-layer-protocol-number;
}
nested-application nested-application-name;
rpc {
program-number rpc-program-number;
}
tcp {
minimum-port port-number <maximum-port port-number>;
}
udp {
minimum-port port-number <maximum-port port-number>;
}
}
regexp regular-expression;
shellcode (all | intel | no-shellcode | sparc);
}
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
238
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
source {
match (equal | greater-than | less-than | not-equal);
value ip-address-or-hostname;
}
[edit security idp custom-attack attack-name attack-type signature protocol ipv4]
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Junos 10.0.
Specify a source IP address or IP address set object to be used as the match source
address object. The default value is any.
address-nameIP address, IP address set object.
239
source-address ip-address;
[edit security idp sensor-configuration packet-log]
source-except
Syntax
Hierarchy Level
source-except [address-name];
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name match]
[edit security idp idp-policy policy-name rulebase-exempt rule rule-name match]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name match]
Release Information
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Description
Specify a source IP address or IP address set object to specify all source address objects
except the specified address objects. The default value is any.
Options
Required Privilege
Level
Related
Documentation
240
Hierarchy Level
Release Information
Description
Options
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
[edit security idp custom-attack attack-name attack-type signature protocol udp]
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
ssl-inspection
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
ssl-inspection {
cache-prune-chunk-size number;
key-protection;
maximum-cache-size number;
session-id-cache-timeout seconds;
sessions number;
}
[edit security idp sensor-configuration]
241
start-log
Syntax
Hierarchy Level
Release Information
Description
Options
start-log value;
[edit security idp sensor-configuration log suppression]
Options
Required Privilege
Level
Related
Documentation
242
start-time start-time;
[edit security idp security-package automatic]
Hierarchy Level
Release Information
Description
Options
statistics {
interval minutes;
}
[edit security idp sensor-configuration application-ddos]
will be collected.
Range: 1 through 60 minutes (1 minute increments)
Default: 1 minute
Required Privilege
Level
Related
Documentation
243
suppression
Syntax
Hierarchy Level
Release Information
Description
Options
suppression {
disable;
(include-destination-address | no-include-destination-address);
max-logs-operate value;
max-time-report value;
start-log value;
}
[edit security idp sensor-configuration log]
244
Hierarchy Level
Release Information
Description
Options
traffic.
serviceFor TCP and UDP, matches traffic based on the source address, source port,
destination address, and destination port of the attack traffic. This is the default.
For ICMP flows, the destination port is 0. Any ICMP flow matching source port, source
address, and destination address is blocked.
245
Hierarchy Level
Release Information
Description
Options
tcp {
minimum-port port-number <maximum-port port-number>;
}
[edit security idp custom-attack attack-name attack-type chain protocol-binding]
[edit security idp custom-attack attack-name attack-type signature protocol-binding]
246
tcp {
ack-number {
match (equal | greater-than | less-than | not-equal);
value acknowledgement-number;
}
data-length {
match (equal | greater-than | less-than | not-equal);
value tcp-data-length;
}
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
header-length {
match (equal | greater-than | less-than | not-equal);
value header-length;
}
mss {
match (equal | greater-than | less-than | not-equal);
value maximum-segment-size;
}
option {
match (equal | greater-than | less-than | not-equal);
value tcp-option;
}
sequence-number {
match (equal | greater-than | less-than | not-equal);
value sequence-number;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
tcp-flags {
(ack | no-ack);
(fin | no-fin);
(psh | no-psh);
(r1 | no-r1);
(r2 | no-r2);
(rst | no-rst);
(syn | no-syn);
(urg | no-urg);
}
urgent-pointer {
match (equal | greater-than | less-than | not-equal);
value urgent-pointer;
}
window-scale {
match (equal | greater-than | less-than | not-equal);
value window-scale-factor;
}
window-size {
247
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
248
tcp-flags
Syntax
Hierarchy Level
Release Information
Description
Options
tcp-flags {
(ack | no-ack);
(fin | no-fin);
(psh | no-psh);
(r1 | no-r1);
(r2 | no-r2);
(rst | no-rst);
(syn | no-syn);
(urg | no-urg);
}
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
fin | no-finWhen set, the final flag indicates that the packet transfer is complete and
psh | no-pshWhen set, the push flag indicates that the receiver should push all data
in the current sequence to the destination application (identified by the port number)
without waiting for the remaining packets in the sequence.
r1 | no-r1When set, indicates that the R1 retransmission threshold has been reached.
r2 | no-r2When set, indicates that the R2 retransmission threshold has been reached.
rst | no-rstWhen set, the reset flag resets the TCP connection, discarding all packets
in an existing sequence.
syn | no-synWhen set, indicates that the sending device is asking for a three-way
Required Privilege
Level
Related
Documentation
urg | no-urgWhen set, the urgent flag indicates that the packet data is urgent.
249
terminal
Syntax
Hierarchy Level
Release Information
Description
Required Privilege
Level
Related
Documentation
terminal;
[edit security idp idp-policy policy-name rulebase-ips rule rule-name]
250
test test-condition;
[edit security idp custom-attack attack-name attack-type anomaly]
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
then {
action {
class-of-service {
dscp-code-point number;
forwarding-class forwarding-class;
}
(close-client | close-client-and-server | close-server |drop-connection | drop-packet |
ignore-connection | mark-diffserv value | no-action | recommended);
}
ip-action {
(ip-block | ip-close | ip-notify);
log;
log-create;
refresh-timeout;
target (destination-address | service | source-address | source-zone | source-zone-address
| zone-service);
timeout seconds;
}
notification {
log-attacks {
alert;
}
packet-log {
post-attack number;
post-attack-timeout seconds;
pre-attack number;
}
}
severity (critical | info | major | minor | warning);
}
[edit security idp idp-policy policy-name rulebase-ips rule rule-name]
251
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
252
then {
action {
(close-server | drop-connection | drop-packet | no-action);
}
ip-action {
(ip-block | ip-close | ip-connection-rate-limit connections-per-second | ip-notify);
log;
log-create;
refresh-timeout;
timeout seconds;
}
notification {
log-attacks {
alert;
}
}
}
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name]
time-binding
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
time-binding {
count count-value;
scope (destination | peer | source);
}
[edit security idp custom-attack attack-name]
Release Information
Description
Options
timeout seconds;
[edit security idp idp-policy policy-name rulebase-ddos rule rule-name then ip-action]
[edit security idp idp-policy policy-name rulebase-ips rule rule-name then ip-action]
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Specify the number of seconds that you want the IP action to remain in effect after a
traffic match.
secondsNumber of seconds the IP action should remain effective.
253
Release Information
Statement introduced in Release 9.2 of Junos OS. Support for rulebase-ddos introduced
in Release 10.0 of Junos OS.
Description
Specify a destination zone to be associated with the security policy. The default value is
any.
Options
Required Privilege
Level
Related
Documentation
254
tos
Syntax
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
tos {
match (equal | greater-than | less-than | not-equal);
value type-of-service-in-decimal;
}
[edit security idp custom-attack attack-name attack-type signature protocol ipv4]
0000Default
0001Minimize Cost
0002Maximize Reliability
0003Maximize Throughput
0004Minimize Delay
0005Maximize Security
255
total-length
Syntax
Hierarchy Level
Release Information
Description
Options
total-length {
match (equal | greater-than | less-than | not-equal);
value total-length-of-ip-datagram;
}
[edit security idp custom-attack attack-name attack-type signature protocol ipv4]
total-memory
Syntax
Hierarchy Level
Release Information
Description
Options
total-memory percentage;
[edit security idp sensor-configuration packet-log]
256
Hierarchy Level
Release Information
Description
Options
traceoptions {
file {
filename;
files number;
match regular-expression;
(no-world-readable | world-readable);
size maximum-file-size;
}
flag all;
level (all | error | info | notice | verbose | warning);
no-remote-trace;
}
[edit security idp]
filenameName of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the directory /var/log. By
default, the name of the file is the name of the process being traced.
files numberMaximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed to trace-file.0, then trace-file.1, and so on,
until the maximum number of trace files is reached. The oldest archived file is
overwritten.
If you specify a maximum number of files, you also must specify a maximum file size
with the size option and a filename.
Range: 2 through 1000 files
Default: 10 files
match regular-expressionRefine the output to include lines that contain the regular
expression.
the user who configures the tracing operation. The world-readable option enables
any user to read the file. To explicitly set the default behavior, use the
no-world-readable option.
(MB), or gigabytes (GB). When a trace file named trace-file reaches this size, it is
renamed trace-file.0. When the trace-file again reaches its maximum size, trace-file.0
is renamed trace-file.1 and trace-file is renamed trace-file.0. This renaming scheme
continues until the maximum number of trace files is reached. Then the oldest trace
file is overwritten.
257
If you specify a maximum file size, you also must specify a maximum number of trace
files with the files option and a filename.
Syntax: x K to specify KB, x m to specify MB, or x g to specify GB
Range: 10 KB through 1 GB
Default: 128 KB
Required Privilege
Level
Related
Documentation
258
Hierarchy Level
Release Information
Description
Options
ttl {
match (equal | greater-than | less-than | not-equal);
value time-to-live;
}
[edit security idp custom-attack attack-name attack-type signature protocol ipv4]
tunable-name
Syntax
Hierarchy Level
Release Information
Description
Options
tunable-name tunable-name {
tunable-value protocol-value;
}
[edit security idp sensor-configuration detector protocol-name protocol-name]
Statement introduced in Release 9.2 of Junos OS. Support for file format decoding over
HTTP using MIME added in Release 11.2 of Junos OS.
Specify the name of the tunable parameter to enable or disable the protocol detector
for each of the service. By default, the protocol decoders for all services are enabled.
tunable-nameName of the specific tunable parameter.
259
tunable-value
Syntax
Hierarchy Level
Release Information
Description
Options
tunable-value protocol-value;
[edit security idp sensor-configuration detector protocol-name protocol-name tunable-name
tunable-name]
Statement introduced in Release 9.2 of Junos OS. Support for file format decoding over
HTTP using MIME added in Release 11.2 of Junos OS.
Specify the value of the tunable parameter to enable or disable the protocol detector
for each of the service.
tunable-valueInteger representing a selected option for the switch specified in
tunable-name. The range of values depends on the options defined for the specified
switch.
Required Privilege
Level
Related
Documentation
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
260
type {
values [anomaly signature];
}
[edit security idp dynamic-attack-group dynamic-attack-group-name filters]
Hierarchy Level
Release Information
Description
Options
type {
match (equal | greater-than | less-than | not-equal);
value type-value;
}
[edit security idp custom-attack attack-name attack-type signature protocol icmp]
Hierarchy Level
Release Information
Description
Options
udp {
minimum-port port-number <maximum-port port-number>;
}
[edit security idp custom-attack attack-name attack-type chain protocol-binding]
[edit security idp custom-attack attack-name attack-type signature protocol-binding]
261
Hierarchy Level
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
udp {
data-length {
match (equal | greater-than | less-than | not-equal);
value data-length;
}
destination-port {
match (equal | greater-than | less-than | not-equal);
value destination-port;
}
source-port {
match (equal | greater-than | less-than | not-equal);
value source-port;
}
}
[edit security idp custom-attack attack-name attack-type signature protocol]
262
udp-anticipated-timeout value;
[edit security idp sensor-configuration flow]
urgent-pointer
Syntax
Hierarchy Level
Release Information
Description
Options
urgent-pointer {
match (equal | greater-than | less-than | not-equal);
value urgent-pointer;
}
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
url url-name;
[edit security idp security-package]
263
weight
Syntax
Hierarchy Level
Release Information
Description
Firewall Capacity
IDP Capacity
Firewall Throughput
IDP Throughput
Default
1,000,000
256,000
10 Gbps
2.4 Gbps
equal
1,000,000
1,000,000
8.5 Gbps
2 Gbps
firewall
1,000,000
1,000,000
10 Gbps
2.4 Gbps
idp
1,000,000
1,000,000
5.5 Gbps
1.4 Gbps
Required Privilege
Level
Related
Documentation
264
window-scale
Syntax
Hierarchy Level
Release Information
Description
Options
window-scale {
match (equal | greater-than | less-than | not-equal);
value window-scale-factor;
}
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
window-size
Syntax
Hierarchy Level
Release Information
Description
Options
window-size {
match (equal | greater-than | less-than | not-equal);
value window-size;
}
[edit security idp custom-attack attack-name attack-type signature protocol tcp]
265
Hierarchy Level
Release Information
Description
Options
trace-options {
file {
filename;
files files-number;
match regular-expression;
(no-world-readable | world-readable);
size maximum-file-size;
}
no-remote-trace;
}
[edit security datapath-debug]
filenameName of the file to receive the output of the tracing operation. Enclose
the name within quotation marks. All files are placed in the directory /var/log. By
default, the name of the file is the name of the process being traced.
files numberMaximum number of trace files. When a trace file named trace-file
reaches its maximum size, it is renamed to trace-file.0, then trace-file.1, and so on,
until the maximum number of trace files is reached. The oldest archived file is
overwritten.
If you specify a maximum number of files, you also must specify a maximum file size
with the size option and a filename.
Range: 2 through 1000 files
Default: 10 files
match regular-expressionRefine the output to include lines that contain the regular
expression.
the user who configures the tracing operation. The world-readable option enables
any user to read the file. To explicitly set the default behavior, use the
no-world-readable option
(MB), or gigabytes (GB). When a trace file named trace-file reaches this size, it is
renamed trace-file.0. When the trace-file again reaches its maximum size, trace-file.0
is renamed trace-file.1 and trace-file is renamed trace-file.0. This renaming scheme
continues until the maximum number of trace files is reached. Then the oldest trace
file is overwritten.
If you specify a maximum file size, you also must specify a maximum number of trace
files with the files option and a filename.
266
Required Privilege
Level
Related
Documentation
267
268
PART 3
Administration
269
270
CHAPTER 11
Clear Commands
271
Release Information
Description
Required Privilege
Level
List of Sample Output
Output Fields
clear
Sample Output
clear security idp status
user@host> clear security idp status
State of IDP: 2-default, Up since: 2010-02-04 13:37:16 UTC (17:13:45 ago)
Packets/second: 0 Peak: 0 @ 2010-02-05 06:49:51 UTC
KBits/second: 0 Peak: 0 @ 2010-02-05 06:49:51 UTC
Latency (microseconds): [min: 0] [max: 0] [avg: 0]
Packet Statistics:
[ICMP: 0] [TCP: 0] [UDP: 0] [Other: 0]
Flow Statistics:
ICMP: [Current: 0] [Max: 0 @ 2010-02-05 06:49:51 UTC]
TCP: [Current: 0] [Max: 0 @ 2010-02-05 06:49:51 UTC]
UDP: [Current: 0] [Max: 0 @ 2010-02-05 06:49:51 UTC]
Other: [Current: 0] [Max: 0 @ 2010-02-05 06:49:51 UTC]
Session Statistics:
[ICMP: 0] [TCP: 0] [UDP: 0] [Other: 0]
Policy Name: sample
Running Detector Version: 10.4.160091104
272
Required Privilege
Level
Related
Documentation
Output Fields
Sample Output
clear security idp application-ddos cache
user@host> clear security idp application-ddos cache
273
Sample Output
clear security idp attack table
user@host> clear security idp attack table
274
Sample Output
clear security idp counters application-identification
user@host> clear security idp counters application-identification
clear_counter_class: counters cleared, status = 0
275
Sample Output
clear security idp counters dfa
user@host> clear security idp counters dfa
clear_counter_class: counters cleared, status = 0
276
Sample Output
clear security idp counters flow
user@host> clear security idp counters dfa
clear_counter_class: counters cleared, status = 0
277
Sample Output
clear security idp counters http-decoder
user@host> clear security idp counters http
278
Sample Output
clear security idp counters ips
user@host> clear security idp counters ips
clear_counter_class: counters cleared, status = 0
279
event-rate
Sample Output
clear security idp counters log
user@host> clear security idp counters log
clear_counter_class: counters cleared, status = 0
280
Sample Output
clear security idp counters packet
user@host> clear security idp counters packet
clear_counter_class: counters cleared, status = 0
281
Sample Output
clear security idp counters policy-manager
user@host> clear security idp counters policy-manager
clear_counter_class: counters cleared, status = 0
282
Sample Output
clear security idp counters tcp-reassembler
user@host> clear security idp counters tcp-reassembler
clear_counter_class: counters cleared, status = 0
283
Sample Output
clear security idp ssl-inspection session-id-cache
user@host> clear security idp ssl-inspection session-id-cache
Total SSL session cache entries cleared : 2
284
CHAPTER 12
Request Commands
285
Release Information
Command introduced in Release 9.2 of Junos OS. Detailed status added in Release 10.1
of Junos OS. Description modified in Release 11.1 of Junos OS. Application package support
added in Release 11.4 of Junos OS.
Description
Manually download the individual components of the security package from the Juniper
Security Engineering portal. The components are downloaded into a staging folder inside
the device.
By default, this command tries to download the delta set attack signature table. It also
downloads IDP, IPS, and application package signatures.
Options
full-update(Optional) Download the latest security package with the full set of attack
Additional Information
Required Privilege
Level
Related
Documentation
286
The request security idp security-package download command does not download security
package files if the installed version on the device is same as the security package version
on the server (https://services.netscreen.com/cgi-bin/index.cgi always). The request
security idp security-package download full-update command downloads the latest
security package files on the device from the server, irrespective of the version on the
device and the server.
maintenance
Output Fields
When you enter this command, you are provided feedback on the status of your request.
Sample Output
request security idp security-package download
user@host> request security idp security-package download
Successfully downloaded from(https://services.netscreen.com/cgi-bin/index.cgi).
Version info:1152(Thu Apr 24 14:37:44 2008, Detector=9.1.140080400)
Sample Output
request security idp security-package download policy-templates
user@host> request security idp security-package download policy-templates
Successfully downloaded from(https://services.netscreen.com/cgi-bin/index.cgi).
Version info:35
Sample Output
request security idp security-package download version 1151 full-update
user@host> request security idp security-package download version 1151 full-update
Successfully downloaded from(https://services.netscreen.com/cgi-bin/index.cgi).
Version info:1151(Wed Apr 23 14:39:15 2008, Detector=9.1.140080400)
When devices are operating in chassis cluster mode, when you check the security package
download status, a message is displayed confirming that the downloaded security
package is being synchronized to the primary and secondary nodes.
user@host> request security idp security-package download status
node0:
-------------------------------------------------------------------------Done;Successfully downloaded from(https://services.netscreen.com/cgi-bin/index.cgi)
and synchronized to backup.
Version info:2011(Mon Oct 17 15:13:06 2011, Detector=11.6.140110920)
287
Release Information
Command introduced in Release 9.2 of Junos OS. Description modified in Release 11.1 of
Junos OS. Added application package support in Release 11.4 of Junos OS.
Description
Updates the attack database inside the device with the newly downloaded one from the
staging folder, recompiles the existing running policy, and pushes the recompiled policy
to the data plane.
Also, if there is an existing running policy, and the previously installed detector's version
is different from the newly downloaded one, the downloaded components are pushed
to the data plane. This command installs IDP, IPS, and application package signatures.
Options
/var/db/scripts/commit/templates.
depending on the new Security database size. Hence, security-package install command
returns immediately and a background process performs the task. User can check the
status using security-package install status command.
but does not compile/push the active policy or the new detector to the data plane.
Required Privilege
Level
Related
Documentation
Output Fields
maintenance
Sample Output
request security idp security-package install
user@host> request security idp security-package install
Will be processed in async mode. Check the status using the status checking CLI
Sample Output
request security idp security-package install status
To request status on a package installation:
288
289
Release Information
Description
Options
Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields
request security idp ssl-inspection key add <key-name> [file <file-name>] [password
<password-string>] [server <server-ip>]
maintenance
request security idp ssl-inspection key add key1 file /var/tmp/enc1.key password
encrypted on page 290
request security idp ssl-inspection key add key2 file /var/tmp/enc2.key password
encrypted on page 290
request security idp ssl-inspection key add key3 file /var/tmp/norm.key on page 291
request security idp ssl-inspection key add key1 server 1.1.0.1 on page 291
request security idp ssl-inspection key add key1 server 1.1.0.2 on page 291
When you enter this command, you are provided feedback on the status of your request.
Sample Output
request security idp ssl-inspection key add key1 file /var/tmp/enc1.key password encrypted
user@host> request security idp ssl-inspection key add key1 file /var/tmp/enc1.key password
encrypted
Added key key1
Sample Output
request security idp ssl-inspection key add key2 file /var/tmp/enc2.key password encrypted
user@host> request security idp ssl-inspection key add key2 file /var/tmp/enc2.key password
encrypted
Added key key2, server 2.2.0.1
290
Sample Output
request security idp ssl-inspection key add key3 file /var/tmp/norm.key
user@host> request security idp ssl-inspection key add key3 file /var/tmp/norm.key
Added key key3
Sample Output
request security idp ssl-inspection key add key1 server 1.1.0.1
user@host> request security idp ssl-inspection key add key1 server 1.1.0.1
Added key key1, server 1.1.0.1
Sample Output
request security idp ssl-inspection key add key1 server 1.1.0.2
user@host> request security idp ssl-inspection key add key1 server 1.1.0.2
Added key key1, server 1.1.0.2
291
NOTE: You will get a delete confirmation question before deleting one or
more keys or server.
Options
server <server-ip> (Optional) Server IP address associated with the specified key to
be deleted.
Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields
maintenance
Sample Output
request security idp ssl-inspection key delete
user@host> request security idp ssl-inspection key delete
This command will delete one or more ssl keys.
Continue? [yes,no] (no) yes
Number of keys 4, server 3 deleted
Sample Output
request security idp ssl-inspection key delete key1
user@host> request security idp ssl-inspection key delete key1
This command will delete one or more ssl keys.
Continue? [yes,no] (no) yes
Number of keys 1, server 2 deleted
292
Sample Output
request security idp ssl-inspection key delete key2 server 2.2.0.1
user@host> request security idp ssl-inspection key delete key2 server 2.2.0.1
This command will delete one or more ssl keys.
Continue? [yes,no] (no) yes
Number of keys 0, server 1 deleted
293
installed database).
Required Privilege
Level
List of Sample Output
Output Fields
maintenance
Sample Output
request security idp storage-cleanup
user@host> request security idp storage-cleanup downloaded-files
Successfully deleted downloaded secdb files
294
CHAPTER 13
Show Commands
295
296
Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields
applicationApplication name
destination-portDestination port
source-portSource port
source-prefixSource IP prefix
view
Table 21: show security flow session idp summary Output Fields
Field Name
Field Description
Valid session
Pending sessions
Invalidated sessions
Total sessions
Sample Output
show security flow session idp summary
root@ show security flow session idp summary
297
298
Required Privilege
Level
Related
Documentation
Field Description
Policy Name
Sample Output
show security idp active-policy
user@host> show security idp active-policy
Policy Name : viking-policy
Running Detector Version : 9.1.140080300
299
Options
profile.
Required Privilege
Level
List of Sample Output
Output Fields
view
Field Description
Zone
Server
Application
Conn/sec
Context
Contexts/tick
Number of protocol context hits measured per tick. One tick equals 60 seconds by default.
Sample Output
show security idp application-ddos application
user@host> show security idp application-ddos application
Zone
trust
300
Server
81.0.3.1
Application
http-server-1
Conn/sec
2648/sec
Context
Contexts/tick
http-header-user-agent
35746/60sec
trust
trust
trust
81.1.0.2
81.1.0.2
81.0.3.1
dns-server-1
dns-server-1
http-server1
4517/sec
1497/sec
1496/sec
dns-type-name
dns-type-name
http-url-parsed
263234/60sec
88061/60sec
81177/60sec
...
Sample Output
show security idp application-ddos application detail
user@host> show security idp counters application-ddos detail
Zone: trust Server: 81.1.0.2 Application: dns-server-1 Connections/sec:
1499/secContext: dns-type-name Contexts/tick: 88061/60sec
Value: 00 05 74 65 73 74 6e 61 6d 65 2e 6a 75 6e 69 70 testname.juniper.net
Value: 65 72 2e 6e 65 74
Context values/tick : 29143/60sec
Zone: trust Server: 81.0.3.1 Application: http-server-1 Connections/sec:
2615/secContext: http-url contexts/tick: 148196/60sec
Value: 2f 6e 65 74 73 63 72 65 65 6e 2e 68 746d 6c /netscreen.htm
Context values/tick : 26809/60sec
...
301
view
Field Description
Description
Sample Output
show security idp attack description
user@host> show security idp attack description FTP:USER:ROOT
Description: This signature detects attempts to login to an FTP server using the
"root" account. This can indicate an attacker trying to gain root-level access,
or it can indicate poor security practices. FTP typically uses plain-text
passwords, and using the root account to FTP could expose sensitive data over the
network.
302
view
Field Description
Display Name
Severity
Category
Recommended
Specifies whether a default action for the IDP attack is recommended by Juniper Networks
(true or false).
Recommended Action
Type
Direction
False Positives
Specifies whether the IDP attack produces false positive on the network.
Service
IDP service configured for the IDP attack. If a service is configured for the IDP attack, the
IDP service name is displayed. Otherwise, Not available is displayed.
Sample Output
show security idp attack detail
user@host> show security idp attack detail FTP:USER:ROOT
Display Name: FTP: "root" Account Login
Severity: Minor
303
Category: FTP
Recommended: false
Recommended Action: None
Type: signature
Direction: CTS
False Positives: unknown
Service: Not available
304
Field Description
Attack name
Name of the attack that you want to match in the monitored network traffic.
Hits
Sample Output
show security idp attack table
user@host> show security idp attack table
IDP attack statistics:
Attack name
HTTP:OVERFLOW:PI3WEB-SLASH-OF
#Hits
1
305
Field Description
306
Table 27: show security idp counters application-ddos Output Fields (continued)
Field Name
Field Description
Number of times context value processing succeeded, including action and logging
events if configured.
Number of times context value processing failed, including action and logging events if
configured.
App-DDOS no action
Sample Output
show security idp counters application-ddos
user@host> show security idp counters application-ddos
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
inspected flows
failed flows
ignored flows
first path failed
first path succeeded
dropped packets
processed packets
connection table process succeeded
connection table process failed
context process succeeded
context process failed
ignore context
context values excluded
context value process succeeded
context value process failed
context value prune failed
no action
drop connection action
drop packet action
447172
0
12267
0
459439
0
449118
459439
0
449118
0
0
0
449118
0
0
275996
0
0
307
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
App-DDOS
308
0
0
0
275996
238
0
Command introduced in Release 9.2 of Junos OS. Updated in Release 12.1 of Junos OS.
Display the status of all IDP application identification (AI) counter values.
view
Field Description
AI matches
AI no-matches
AI-enabled sessions
AI-disabled sessions
Number of sessions with AI disabled because the configured session limit was reached.
Number of sessions with AI disabled because the maximum session limit was reached.
309
Table 28: show security idp counters application-identification Output Fields (continued)
Field Name
Field Description
Number of sessions with AI disabled because the memory usage limit per session was
reached.
Number of sessions with AI disabled because the global memory usage limit was reached.
Policy update
Sample Output
show security idp counters application-identification
user@host> show security idp counters application-identification
IDP counters:
IDP counter type
AI matches
AI no-matches
AI-enabled sessions
AI-disabled sessions
AI-disabled sessions due to gate match
AI-disabled sessions due to ssl encapsulated flows
AI-disabled sessions due to cache hit
AI-disabled sessions due to configuration
AI-disabled sessions due to protocol remapping
AI-disabled sessions due to RPC match
AI-disabled sessions due to non-TCP/UDP flows
AI-disabled sessions due to session limit
AI-disabled sessions due to session packet memory limit
AI-disabled sessions due to global packet memory limit
Packets cloned for AI
Policy update
310
Value
4
0
4
0
0
0
0
0
0
0
0
0
0
0
12
0
Field Description
DFA Matches
Sample Output
show security idp counters dfa
user@host> show security idp counters dfa
IDP counters:
IDP counter type
DFA Group Merged Usage
DFA Matches
Value
0
1
311
Field Description
Fast-path packets
Number of packets that are set through fast path after completing idp policy lookup.
Slow-path packets
Number of packet that are sent through slow path during idp policy lookup.
ICMP-error packets
(Unsupported)
Session construction failed
(Unsupported)
Session limit reached
(Unsupported)
Invalide index at age-out
(Unsupported)
Packet logging
Busy packets
Number of packets saved as the one or more packets of this session are handed off for
async processing.
(Unsupported)
Policy cache hits
312
Table 30: show security idp counters flow Output Fields (continued)
Field Name
Field Description
Maximum number of packets of one flow that share the same hash value.
Bad-UDP-checksumpackets
(Unsupported)
Gates added
Gate matches
(Unsupported)
Sessions deleted
Sessions aged-out
Number of sessions are aged out if no traffic is received within session timeout value.
(Unsupported)
Sessions in-use while aged-out
(Unsupported)
TCP flows marked dead on RST/FIN
Sessions constructed
Sessions destructed
SM Session Create
SM Packet Process
SM Session close
Sample Output
show security idp counters flow
user@host> show security idp counters flow
IDP counters:
IDP counter type
Fast-path packets
Slow-path packets
ICMP-error packets
Session construction failed
Session limit reached
Not a new session
Invalide index at ageout
Value
0
1
0
0
0
0
0
313
Packet logging
Busy packets
Policy cache hits
Policy cache misses
Maximum flow hash collisions
Flow hash collisions
Bad-UDP-checksum packets
Gates added
Gate matches
Sessions deleted
Sessions aged-out
Sessoins in-use while aged-out
TCP flows marked dead on RST/FIN
Sessions constructed
Sessions destructed
SM Session Create
SM Packet Process
SM Session close
314
0
0
0
1
0
0
0
0
0
1
0
0
1
1
1
1
28
1
Field Description
Number of active file decoder requests sent over HTTP from MIME.
Number of pending file decoder requests sent over HTTP from MIME.
Number of completed file decoder requests sent over HTTP from MIME.
No of compressed payload
transferred over HTTP
Sample Output
show security idp counters http-decoder
user@host> show security idp counters http-decoder
IDP counters:
IDP counter type
No of filedecoder requests from MIME over HTTP
No of pending filedecoder requests from MIME over HTTP
No of completed filedecoder requests from MIME over HTTP
No of unrecognized file type from MIME over HTTP
No of compressed payload transferred over HTTP
Value
0
0
0
0
0
315
Field Description
Layer-4 anomalies
Number of attempts to match stream based attacks in first 256 bytes of traffic stream.
Context matches
Tail DFAs
Exempted attacks
Number of times attack is excluded from match due to member attacks in an attack
group did not complete chain.
316
Table 32: show security idp counters ips Output Fields (continued)
Field Name
Field Description
Number of times an IDS context can not be written as the IDS device is full.
(Unsupported)
Number of sessions those did not find attack instance in IDS cache.
(Unsupported)
Shellcode detection invocations
Wrong offsets
Number of times attack's offset is not within the service offset range.
No peer MAC
(Unsupported)
Sample Output
show security idp counters ips
user@host> show security idp counters ips
IDP counters:
IDP counter type
TCP fast path
Layer-4 anomalies
Anomaly hash misses
Line context matches
Stream256 context matches
Stream context matches
Packet context matches
Packet header matches
Context matches
Regular expression matches
Tail DFAs
Exempted attacks
Out of order chains
Partial chain matches
IDS device FIFO size
IDS device FIFO overflows
Brute force queue size
IDS cache hits
IDS cache misses
Shellcode detection invocations
Wrong offsets
Value
15
0
3
5
5
5
0
0
12
0
0
0
0
0
0
0
0
0
0
0
0
317
No peer MAC
Content-decompression
Content-decompression
Content-decompression
Content-decompression
Content-decompression
Content-decompression
Content-decompression
Content-decompression
Content-decompression
Content-decompression
318
memory usage in KB
memory over limit
gunzip called
gunzip failed
others called
others failed
input bytes
output bytes
ratio over limit
type mismatch
0
0
0
0
0
0
0
0
0
0
0
event-rate
Field Description
Logs dropped
(Unsupported)
Logs ready to be sent
(Unsupported)
Logs in suppression list
(Unsupported)
Log timers created
Number of packets that are ready to be sent with high degree watermark.
(Unsupported)
Log receive buffer full
(Unsupported)
319
Table 33: show security idp counters log Output Fields (continued)
Field Name
Field Description
(Unsupported)
Reads per second
(Unsupported)
Logs in read buffer high watermark
(Unsupported)
Packets logged
Packets lost
(Unsupported)
Packets copied
(Unsupported)
Packets held
(Unsupported)
Packets released
IP Action Messages
(Unsupported)
IP Action Drops
(Unsupported)
IP Action Exists
(Unsupported)
NWaits
(Unsupported)
Match vectors
Supercedes
320
Sample Output
show security idp counters log
user@host> show security idp counters log
IDP counters:
IDP counter type
Logs dropped
Suppressed log count
Logs waiting for post-window packets
Logs ready to be sent
Logs in suppression list
Log timers created
Logs timers expired
Log timers cancelled
Logs ready to be sent high watermark
Log receive buffer full
Packet log too big
Reads per second
Logs in read buffer high watermark
Log Bytes in read buffer high watermark
Packets logged
Packets lost
Packets copied
Packets held
Packets released
IP Action Messages
IP Action Drops
IP Action Exists
NWaits
Match vectors
Supercedes
Kpacket too big
Value
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
321
Description
Required Privilege
Level
Related
Documentation
List of Sample Output
Output Fields
Command introduced in Release 9.2 of Junos OS. Dropped by IDP policy and Dropped by
Error added in Release 10.1 of Junos OS.
Display the status of all IDP packet counter values.
view
Field Description
Processed packets
Dropped packets
Dropped by Error
Dropped sessions
(Unsupported)
Bad IP headers
Decapsulated packets
GRE decapsulations
(Unsupported)
PPP decapsulations
(Unsupported)
GTP decapsulations
(Unsupported)
322
Table 34: show security idp counters packet Output Fields (continued)
Field Name
Field Description
GTP flows
(Unsupported)
TCP decompression uncompressed
IP
(Unsupported)
TCP decompression compressed IP
(Unsupported)
Deferred-send packets
(Unsupported)
IP-in-IP packets
(Unsupported)
TTL errors
(Unsupported)
Routing loops
(Unsupported)
No-route packets
(Unsupported)
Flood IP
(Unsupported)
Invalid ethernet headers
(Unsupported)
Packets attached
Packets cloned
Packets allocated
Packets destructed
323
Sample Output
show security idp counters packet
user@host> show security idp counters packet
IDP counters:
IDP counter type
Processed packets
Dropped packets
Dropped by IDP policy
Dropped by error
Dropped sessions
Bad IP headers
Packets with IP options
Decapsulated packets
GRE decapsulations
PPP decapsulations
GTP decapsulations
GTP flows
TCP decompression uncompressed IP
TCP decompression compressed IP
Deferred-send packets
IP-in-IP packets
TTL errors
Routing loops
STP drops
No-route packets
Flood IP
Invalid ethernet headers
Packets attached
Packets cloned
Packets allocated
Packets destructed
324
Value
27
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
28
28
0
55
The following table lists the output fields for the show security idp counters packet-log
command. Output fields are listed in the approximate order in which they appear.
Field Name
Field Description
Number of sessions that have performed packet capture since the capture facility was
activated.
Number of objects containing log messages generated during packet capture that were
not successfully transmitted to the host.
Number of objects containing captured packets that were not successfully transmitted
to the host.
Number of sessions that could not initiate packet capture because the maximum number
of sessions specified for the device were conducting captures at that time.
Number of packets not captured because the packet limit specified for this device was
reached.
Number of packets not captured because the memory allocated for packet capture on
this device was exceeded.
Sample Output
show security idp counters packet-log
user@host> show security idp counters packet-log
IDP counters:
Total packets captured since packet capture was activated
Value
0
325
326
0
0
0
0
0
0
0
0
0
Field Description
Number of policies
Sample Output
show security idp counters policy-manager
user@host> show security idp counters policy-manager
IDP counters:
IDP counter type
Number of policies
Number of aged out policies
Value
0
0
327
Field Description
(Unsupported)
Bad TCP headers
Number of segments that are sent through the slow path if the TCP segment does not
pass fast-path segment validation.
Number of segments that are sent through the fast path after passing a predefined TCP
validation sequence.
Session reuses
SYN retransmissions
328
Table 36: show security idp counters tcp-reassembler Output Fields (continued)
Field Name
Field Description
Number of new segments that overlap with the end of old segment.
Number of new segments that overlap after the end of old segment.
Segments in memory
Overflow drops
Copied packets
(Unsupported)
Number of Ack packets seen without having seen SYN on the same session.
Closed Acks
Sample Output
show security idp counters tcp-reassembler
user@host> show security idp counters tcp-reassembler
IDP counters:
IDP counter type
Bad TCP checksums
Bad TCP headers
Slow path segments
Fast path segments
Sequence number wrap around errors
Session reuses
SYN retransmissions
Bad three way handshake acknowledgements
Sequence number out of sync flows
Value
0
0
4
23
0
0
0
0
0
329
330
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Release Information
Description
Required Privilege
Level
Related
Documentation
Display the IDP policy assigned to a logical system. The IDP policy is assigned to a logical
system through the security profile.
view
security-profile
Field Description
Logical system
IDP policy
Name of the IDP policy that is specified in the security profile that is bound to the logical
system.
Sample Output
show security idp logical-system policy-association
user@host> show security idp logical-system policy-association
Logical system
IDP policy
root-logical-system
idp-policy1
lsys1
idp-policy2
331
Description
Required Privilege
Level
List of Sample Output
Output Fields
Command introduced in Release 9.2 of Junos OS. Percentage outputs added in Release
10.1 of Junos OS.
Display the status of all IDP data plane memory.
view
Field Description
PIC
Total memory space that is allocated for the IDP data plane.
NOTE: IDP requires a minimum of 5 MB of memory for session inspection.
Used
Available
Sample Output
show security idp memory
user@host> show security idp memory
IDP data plane memory statistics:
PIC : FPC 0 PIC 0:
Total IDP data plane memory : 196 MB
Used : 8 MB ( 8192 KB ) ( 4.08% )
Available : 188 MB ( 192512 KB ) (95.91%)
332
Sample Output
Subscriber:
ID
Name
new1
s0,
Installed policies:
Sessions
0
Memory
10179
detector
9.2.160090324
333
Sample Output
user@host> show security idp policy-commit-status
Reading prereq sensor config...
334
335
Sample Output
DMZ_Services
DNS_Service
File_Server
Getting_Started
IDP_Default
Recommended
Web_Server
336
Release Information
Description
Options
Required Privilege
Level
Output Fields
critical
info
major
minor
warning
any
client-to-server
exclude-any
exclude-client-to-server
exclude-server-to-client
server-to-client
view
Sample Output
APP:AMANDA:AMANDA-ROOT-OF1
APP:AMANDA:AMANDA-ROOT-OF2
APP:ARKEIA:TYPE-77-OF
APP:CA:ALERT-SRV-OF
APP:CA:ARCSRV:TCP-BOF
APP:CA:ARCSRV:UA-OF
APP:CA:IGATEWAY-BOF
APP:CA:LIC-COMMAND-OF
APP:CA:LIC-GCR-OF
APP:CA:LIC-GETCONFIG-OF
APP:CA:LIC-GETCONFIG-OF2
APP:CA:LIC-PUTOLF-OF
337
APP:CDE-DTSPCD-OF
APP:DOUBLETAKE
APP:ETHEREAL:DISTCC-OF
APP:HPOVNNM:HPOVTRACE-OF
APP:KERBEROS:GSS-ZERO-TOKEN
APP:KERBEROS:KBR-DOS-TCP-2
APP:MDAEMON:FORM2RAW-OF
APP:MERCURY-BOF
APP:MISC:MCAFFEE-SRV-HDR
APP:NTOP-WEB-FS1
APP:PPTP:MICROSOFT-PPTP
APP:REMOTE:TIMBUKTU-AUTH-OF
338
Required Privilege
Level
Related
Documentation
Field Description
Attack database version number that are currently installed on the system.
Detector version
Sample Output
show security idp security-package-version
user@host> show security idp security-package-version
Attack database version:1154(Mon Apr 28 15:08:42 2008)
Detector version :9.1.140080400
Policy template version :7
339
Required Privilege
Level
List of Sample Output
Output Fields
view
Field Description
key
server
Sample Output
show security idp ssl-inspection key
user@host> show security idp ssl-inspection key
Total SSL keys : 4
SSL Server key and ip address:
Key
Key
Key
key
:
:
:
:
Sample Output
show security idp ssl-inspection key key2
user@host> show security idp ssl-inspection key key2
SSL Server key and ip address:
Key : key2, server : 2.2.0.1
340
Field Description
Sample Output
show security idp ssl-inspection session-id-cache
user@host> show security idp ssl-inspection session-id-cache
SSL session identifiers :
c98396c768f983b515d93bb7c421fb6b8ce5c2c5c230b8739b7fcf8ce9c0de4e
a211321a3242233243c3dc0d421fb6b8ce5e4e983b515d932c5c230b87392c
Total SSL session identifiers : 2
341
Description
Required Privilege
Level
List of Sample Output
Output Fields
Command introduced in Release 9.2 of Junos OS. Multiple detector information introduced
in Release 10.1 of Junos OS. Output changed to support IDP dedicated mode in Release
11.2 of Junos OS.
Display the status of the current IDP policy.
view
Field Description
State of IDP
Packets/second
KBits/second
Latency
Packet Statistics
Flow Statistics
Session Statistics
Policy Name
Name of the running policy. If IDP is configured for logical systems, idp-policy-combined
is displayed.
342
Sample Output
show security idp status
user@host> show security idp status
State of IDP: 2default, Up since: 2010-02-04 13:37:16 UTC (17:15:02 ago)
Packets/second: 5
Peak: 11 @ 2010-02-05 06:51:58 UTC
KBits/second : 2
Peak: 5 @ 2010-02-05 06:52:06 UTC
Latency (microseconds): [min: 0] [max: 0] [avg: 0]
Packet Statistics:
[ICMP: 0] [TCP: 82] [UDP: 0] [Other: 0]
Flow Statistics:
ICMP: [Current: 0] [Max: 0 @ 2010-02-05 06:49:51 UTC]
TCP: [Current: 2] [Max: 6 @ 2010-02-05 06:52:08 UTC]
UDP: [Current: 0] [Max: 0 @ 2010-02-05 06:49:51 UTC]
Other: [Current: 0] [Max: 0 @ 2010-02-05 06:49:51 UTC]
Session Statistics:
[ICMP: 0] [TCP: 1] [UDP: 0] [Other: 0]
Policy Name : sample
Running Detector Version : 10.4.160091104
343
Description
Required Privilege
Level
Command introduced in Release 10.1 of Junos OS. Output changed to support IDP
dedicated mode in Release 11.2 of Junos OS.
Display statistics for each Services Processing Unit (SPU), including multiple detector
information for each SPU.
view
Sample Output
show security idp status detail
user@host> show security idp status detail
PIC : FPC 1 PIC 1:
State of IDP: Default, Up since: 2011-03-29 17:25:07 UTC (00:02:48 ago)
Packets/second: 0
Peak: 0 @ 2011-03-29 17:25:07 UTC
KBits/second : 0
Peak: 0 @ 2011-03-29 17:25:07 UTC
Latency (microseconds): [min: 0] [max: 0] [avg: 0]
Packet Statistics:
[ICMP: 0] [TCP: 0] [UDP: 0] [Other: 0]
Flow Statistics:
ICMP: [Current: 0] [Max: 0 @ 2011-03-29 17:25:07 UTC]
TCP: [Current: 0] [Max: 0 @ 2011-03-29 17:25:07 UTC]
UDP: [Current: 0] [Max: 0 @ 2011-03-29 17:25:07 UTC]
Other: [Current: 0] [Max: 0 @ 2011-03-29 17:25:07 UTC]
Session Statistics:
[ICMP: 0] [TCP: 0] [UDP: 0] [Other: 0]
Number of SSL Sessions : 0
PIC : FPC 1 PIC 0:
State of IDP: Default,
Packets/second: 0
Peak: 0 @ 2011-03-29 17:25:08 UTC
KBits/second : 0
Peak: 0 @ 2011-03-29 17:25:08 UTC
Latency (microseconds): [min: 0] [max: 0] [avg: 0]
Packet Statistics:
[ICMP: 0] [TCP: 0] [UDP: 0] [Other: 0]
Flow Statistics:
ICMP: [Current: 0] [Max: 0 @ 2011-03-29 17:25:08 UTC]
TCP: [Current: 0] [Max: 0 @ 2011-03-29 17:25:08 UTC]
UDP: [Current: 0] [Max: 0 @ 2011-03-29 17:25:08 UTC]
Other: [Current: 0] [Max: 0 @ 2011-03-29 17:25:08 UTC]
Session Statistics:
344
Packets/second: 0
Peak: 0 @ 2011-03-29 17:25:04 UTC
KBits/second : 0
Peak: 0 @ 2011-03-29 17:25:04 UTC
Latency (microseconds): [min: 0] [max: 0] [avg: 0]
Packet Statistics:
[ICMP: 0] [TCP: 0] [UDP: 0] [Other: 0]
Flow Statistics:
ICMP: [Current: 0] [Max: 0 @ 2011-03-29 17:25:04 UTC]
TCP: [Current: 0] [Max: 0 @ 2011-03-29 17:25:04 UTC]
UDP: [Current: 0] [Max: 0 @ 2011-03-29 17:25:04 UTC]
Other: [Current: 0] [Max: 0 @ 2011-03-29 17:25:04 UTC]
Session Statistics:
[ICMP: 0] [TCP: 0] [UDP: 0] [Other: 0]
firewall
345
346
PART 4
Index
347
348
Index
Symbols
#, comments in configuration statements...................xvi
( ), in syntax descriptions....................................................xvi
< >, in syntax descriptions...................................................xvi
[ ], in configuration statements.........................................xvi
{ }, in configuration statements........................................xvi
| (pipe), in syntax descriptions..........................................xvi
A
Access Manager license..........................................................8
ack-number statement......................................................120
action statement...................................................................122
(Security Application-Level DDoS)........................121
active-policy statement......................................................123
alert statement.......................................................................123
allow-icmp-without-flow statement............................124
anomaly statement..............................................................124
application (Security IDP).................................................126
application binding................................................................34
application sets
IDP, configuring...............................................................79
overview..............................................................................31
application statement
(Security Application-Level DDoS).......................125
(Security Custom Attack).........................................125
application-ddos statement.............................................126
application-identification statement.............................127
application-level DDoS rule statement.........................217
application-services..............................................................119
applications
IDP, configuring................................................................77
attack-type (Security IDP)................................................130
attack-type statement
(Security Anomaly)......................................................127
(Security Chain)............................................................128
(Security Signature)....................................................134
attacks statement
(Security Exempt Rulebase)....................................138
(Security IPS Rulebase).............................................138
automatic statement..........................................................139
C
cache-size statement
(Security)........................................................................139
category statement
(Security Dynamic Attack Group).........................140
chain statement......................................................................141
clear security idp ..................................................................272
clear security idp application-ddos cache..................273
clear security idp attack table command....................274
clear security idp counters application-identification
command............................................................................275
clear security idp counters dfa command..................276
clear security idp counters flow command.................277
clear security idp counters http-decoder
command............................................................................278
clear security idp counters ips command...................279
clear security idp counters log command..................280
clear security idp counters packet command............281
clear security idp counters policy-manager
command...........................................................................282
clear security idp counters tcp-reassembler
command...........................................................................283
clear security idp ssl-inspection session-id-cache
command...........................................................................284
code statement......................................................................142
comments, in configuration statements.......................xvi
compound attack sample...................................................49
configuring
anomaly attack objects...............................................53
DSCP in IDP policy.........................................................73
exempt rulebase............................................................68
IDP application sets......................................................79
IDP applications..............................................................77
IDP in security policy.....................................................57
IDP services.......................................................................77
IPS rulebase.....................................................................65
protocol anomaly-based attack..............................88
signature attack objects..............................................85
terminal rules....................................................................71
349
content-decompression-max-memory-kb
statement............................................................................143
content-decompression-max-ratio
statement............................................................................144
context statement
(Security Custom Attack).........................................142
conventions
text and syntax................................................................xv
count statement
(Security Custom Attack).........................................144
curly braces, in configuration statements.....................xvi
custom attacks
application binding........................................................34
compound.........................................................................47
configuring................................................................53, 85
name...................................................................................34
protocol anomaly..........................................................46
protocol binding.............................................................38
service binding................................................................34
severity...............................................................................34
signature...........................................................................40
time binding.....................................................................39
custom-attack statement.................................................145
custom-attack-group statement...................................150
custom-attack-groups (Security IDP)..........................150
custom-attacks statement................................................151
customer support..................................................................xvii
contacting JTAC.............................................................xvii
direction statement
(Security Custom Attack).........................................155
(Security Dynamic Attack Group).........................156
documentation
comments on.................................................................xvii
download-timeout statement..........................................157
Dynamic VPN license..............................................................8
dynamic-attack-group statement.................................158
dynamic-attack-groups (Security IDP)........................159
E
enable-all-qmodules statement....................................159
enable-packet-pool statement......................................160
exempt rulebase
configuring.......................................................................68
expression statement.........................................................160
F
false-positives statement...................................................161
fifo-max-size...................................................................161, 162
filters statement....................................................................163
flow statement
(Security IDP)................................................................164
font conventions......................................................................xv
forwarding-process..............................................................165
from-zone statement
(Security IDP Policy)...................................................164
G
D
data-length statement........................................................151
defining
exempt rulebase............................................................68
IPS rulebase.....................................................................65
description statement
(Security IDP Policy)...................................................152
destination statement
(Security IP Headers Attack)...................................152
destination-address statement
(Security IDP Policy)...................................................153
destination-except statement.........................................153
destination-port statement
(Security Signature Attack).....................................154
detect-shellcode statement.............................................154
detector statement..............................................................155
Diffserv
configuring in IDP policy...............................................73
350
group-members statement..............................................166
H
hash-table-size .....................................................................167
header-length statement...................................................167
high-availability ....................................................................168
I
ICMP header flags..................................................................45
icmp statement
(Security IDP Custom Attack)................................168
(Security IDP Signature Attack).............................169
icmpv6 (Security IDP).........................................................170
identification statement
(Security ICMP Headers)...........................................170
(Security IP Headers)...................................................171
IDP
application and services..............................................77
application sets...............................................................31
application sets, configuring......................................79
Index
ip-action statement
(Security Application-Level DDoS)........................177
(Security IDP Rulebase IPS).....................................178
ip-block statement...............................................................179
ip-close statement................................................................179
ip-connection-rate-limit statement..............................180
ip-flags statement...............................................................180
ip-notify statement...............................................................181
IPS rulebase
configuring........................................................................65
ips statement...........................................................................181
ipv4 statement
(Security IDP Signature Attack).............................182
IPv6.................................................................................................5
support table......................................................................5
ipv6 (Security IDP)...............................................................183
J
J Series Services Devices
licenses.................................................................................8
Juniper-Kaspersky Anti-Virus license................................8
Juniper-Sophos Anti-Spam license...................................8
Juniper-Websense Integrated Web Filtering
license.......................................................................................8
L
licenses
Access Manager................................................................8
application signature update (Application
Identification)................................................................8
BGP route reflectors........................................................8
Dynamic VPN.....................................................................8
IDP signature update......................................................8
J Series Services Device ................................................8
Juniper-Kaspersky Anti-Virus......................................8
Juniper-Sophos Anti-Spam.........................................8
Juniper-Websense Integrated Web Filtering
license..............................................................................8
SRX Series Services Gateway......................................8
SRX100 Memory Upgrade license.............................8
UTM.......................................................................................8
log statement
(Security IDP Policy)...................................................184
(Security IDP)................................................................183
log-attacks statement........................................................184
log-create statement..........................................................185
log-errors statement............................................................185
log-supercede-min statement........................................186
351
manuals
comments on.................................................................xvii
match statement
(Security IDP Policy)...................................................187
(Security Rulebase DDoS).......................................188
max-flow-mem statement...............................................188
max-logs-operate statement..........................................189
max-packet-mem statement..........................................189
max-packet-memory statement...................................190
max-sessions statement
(Security Packet Log)................................................190
max-tcp-session-packet-memory statement...........191
max-time-report statement..............................................191
max-timers-poll-ticks statement...................................192
max-udp-session-packet-memory statement.........192
maximize-alg-sessions........................................................119
maximize-cp-sessions.........................................................119
maximize-idp-sessions...............................................119, 193
member statement
(Security IDP)................................................................194
mss statement
(Security IDP)................................................................194
packet-log statement.........................................................198
(Security IDP Sensor Configuration)....................199
parentheses, in syntax descriptions................................xvi
pattern statement
(Security IDP)................................................................199
performance statement....................................................200
policy
IDP See IDP
policy templates
predefined.........................................................................23
policy-lookup-cache statement....................................200
post-attack statement.......................................................201
post-attack-timeout statement.....................................201
pre-attack statement.........................................................202
pre-filter-shellcode statement.......................................202
predefined policy templates...............................................23
overview.............................................................................23
predefined-attack-groups statement..........................203
predefined-attacks statement.......................................203
Primary-level entry
secondary-level entry............................................91, 96
Primary-level entry only................................................91, 96
process-ignore-s2c statement.......................................204
process-override statement............................................204
process-port statement....................................................205
products statement............................................................205
protocol anomaly...................................................................46
protocol anomaly attack......................................................47
direction............................................................................46
expression (boolean expression)............................48
member index.................................................................48
member index sample.................................................48
order....................................................................................47
reset.....................................................................................47
sample........................................................................46, 49
scope...................................................................................47
test condition..................................................................46
protocol anomaly attack sample.....................................46
protocol anomaly-based attack
configuring.......................................................................88
protocol binding......................................................................38
sample format................................................................39
protocol statement
(Security IDP IP Headers)........................................207
(Security IDP Signature Attack)............................208
protocol-binding statement............................................206
protocol-name statement................................................207
N
negate statement.................................................................195
nested-application (Security IDP).................................195
no-allow-icmp-without-flow statement.....................124
no-detect-shellcode statement......................................154
no-enable-all-qmodules statement.............................159
no-enable-packet-pool statement...............................160
no-ignore-memory-overflow statement......................174
no-ignore-regular-expression statement.....................175
no-include-destination-address statement...............176
no-log-errors statement....................................................185
no-policy-lookup-cache statement.............................200
no-process-ignore-s2c statement................................204
no-process-override statement.....................................204
no-reset-on-policy statement.........................................214
notification statement........................................................196
O
option statement
(Security IDP).................................................................197
order statement
(Security IDP).................................................................197
352
Index
R
re-assembler statement......................................................211
recommended-action statement...................................212
refresh-timeout statement................................................212
regexp statement..................................................................213
reject-timeout statement..................................................213
request security idp security-package download
command...........................................................................286
request security idp security-package install
command...........................................................................288
request security idp ssl-inspection key add
command...........................................................................290
request security idp ssl-inspection key delete
command............................................................................292
request security idp storage-cleanup
command...........................................................................294
reset statement
(Security IDP)................................................................214
reset-on-policy statement................................................214
route reflectors, BGP, license................................................8
rpc statement.........................................................................215
rule statement
(Security DDoS Rulebase)........................................217
(Security Exempt Rulebase)....................................216
(Security IPS Rulebase).............................................218
rulebase
exempt, attack objects.................................................27
exempt, match condition............................................27
exempt, overview............................................................27
IPS, action.........................................................................26
IPS, attack objects.........................................................26
IPS, IP action....................................................................26
IPS, match condition....................................................26
IPS, notification...............................................................26
IPS, overview....................................................................26
IPS, terminal flag............................................................26
overview.............................................................................22
rules......................................................................................15
rulebase-ddos statement.................................................220
rulebase-exempt statement.............................................221
rulebase-ips statement......................................................222
rules
actions.................................................................................19
deactivating.....................................................................64
inserting.............................................................................63
IP actions............................................................................21
match conditions............................................................15
objects.................................................................................16
objects, address..............................................................16
objects, attack..................................................................17
objects, service................................................................16
objects, zone.....................................................................16
overview..............................................................................15
terminal.............................................................................28
S
scope statement
(Security IDP Chain Attack).....................................223
(Security IDP Custom Attack)................................224
security policy
enabling IDP.....................................................................57
security-package statement............................................225
sensor-configuration statement....................................226
sequence-number statement
(Security IDP ICMP Headers).................................228
(Security IDP TCP Headers)....................................228
service binding.........................................................................34
service statement
(Security Dynamic Attack Group).........................229
(Security IDP Anomaly Attack)..............................229
services
IDP, configuring................................................................77
sessions statement.............................................................230
severity statement
(Security Dynamic Attack Group).........................232
(Security IDP Custom Attack).................................231
(Security IDP IPS Rulebase)....................................233
shellcode statement...........................................................234
show security idp active-policy command................299
show security idp application-ddos
command...........................................................................300
show security idp attack description
command...........................................................................302
show security idp attack detail command.................303
show security idp attack table command..................305
show security idp counters application-ddos
command...........................................................................306
show security idp counters
application-identification command......................309
show security idp counters dfa command...................311
show security idp counters flow command................312
show security idp counters ips command...................316
show security idp counters log command..................319
show security idp counters packet command..........322
show security idp counters packet-log
command............................................................................325
show security idp counters policy-manager
command............................................................................327
353
354
start-time statement
(Security IDP)................................................................242
statistics statement
(Security IDP)...............................................................243
support, technical See technical support
suppression statement......................................................244
syntax conventions.................................................................xv
T
target statement..................................................................245
TCP header flag attack protection
configuration...................................................................44
tcp statement
(Security IDP Protocol Binding)............................246
(Security IDP Signature Attack).............................247
tcp-flags statement............................................................249
technical support
contacting JTAC.............................................................xvii
terminal rules
overview............................................................................28
setting..................................................................................71
terminal statement.............................................................250
test statement
(Security IDP)...............................................................250
then statement
(Security IDP Policy)...................................................251
(Security Rulebase DDos)........................................252
time binding..............................................................................39
count..................................................................................40
scope..................................................................................40
time-binding statement.....................................................253
timeout statement
(Security IDP Policy)..................................................253
to-zone statement
(Security IDP Policy)..................................................254
tos statement........................................................................255
total-length statement......................................................256
total-memory statement..................................................256
traceoptions statement
(Security IDP)................................................................257
datapath-debug..........................................................266
ttl statement
(Security IDP)...............................................................259
tunable-name statement.................................................259
tunable-value statement.................................................260
type statement
(Security Dynamic Attack Group)........................260
(Security IDP ICMP Headers)..................................261
Index
U
UDP header attack protection
configuration....................................................................45
udp statement
(Security IDP Protocol Binding)..............................261
(Security IDP Signature Attack)............................262
udp-anticipated-timeout..................................................262
Unified Threat Management (UTM) license..................8
urgent-pointer statement.................................................263
url statement
(Security IDP)...............................................................263
UTM license.................................................................................8
W
window-scale statement..................................................265
window-size statement.....................................................265
355
356