[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]

Configuring Signature-Based Attacks

To configure a custom attack object, you specify a unique name for it and then specify additional information, which can make it easier for you to locate and maintain the attack object.

Certain properties in the attack object definitions are common to all types of attacks, such as attack name, severity level, service or application binding, time binding, and protocol or port binding. Some fields are specific to an attack type and are available only for that specific attack definition.

Signature attack objects use a stateful attack signature (a pattern that always exists within a specific section of the attack) to detect known attacks. They also include the protocol or service used to perpetrate the attack and the context in which the attack occurs. The following properties are specific to signature attacks, and you can configure them when configuring signature attack—attack context, attack direction, attack pattern, and protocol-specific parameters (TCP, UDP, ICMP, or IP header fields).

Before You Begin

  1. For background information, read:
  2. Establish basic connectivity. For more information, see the Getting Started Guide for your device.
  3. Configure network interfaces. See the JUNOS Software Interfaces and Routing Configuration Guide.

When configuring signature-based attacks, keep the following in mind:

The configuration instructions in this topic describe how to create a signature-based attack object. In this example, you create a signature attack named sig1 and assign it the following properties:

Once you have configured a signature-based attack object, you specify the attack as match criteria in an IDP policy rule. For more information, see Defining Rules for an IPS Rulebase.

You can use either J-Web or the CLI configuration editor to create a custom attack object.

This topic contains:

CLI Configuration

To create a signature-based attack object:

  1. Specify a name for the attack. The following statement specifies sig1 as the name of the attack.
    user@host# set security idp custom-attack sig1
  2. Specify common properties for the attack. The following statements specify a recommended action to drop packets and define time binding with scope as source scope and count as 10.
    user@host# set security idp custom-attack sig1 recommended-action drop-packet
    user@host#set security idp custom-attack sig1 time-binding scope source count 10
  3. Specify the attack type and context. The following statement specifies the attack type signature and context packet.
    user@host# set security idp custom-attack sig1 attack-type signature context packet
  4. Specify the attack direction and the shellcode flag. The following statement specifies the attack direction any and sets the shellcode flag to intel.
    user@host# set security idp custom-attack sig1 attack-type signature shellcode intel
  5. Set the protocol and its fields. The following statement specifies the IP protocol and the TTL value 128.
    user@host# set security idp custom-attack sig1 attack-type signature protocol ip ttl value 128 match equal
  6. Specify the protocol binding and ports. The following statement specifies the TCP protocol and the port range from 50 through 100.
    user@host# set security idp custom-attack sig1 attack-type signature protocol-binding tcp minimum-port 50 maximum-port 100
  7. If you are finished configuring the router, commit the configuration.
  8. From configuration mode in the CLI, enter the show security idp command to verify the configuration. For more information, see the JUNOS Software CLI Reference.

Related Topics


[ Contents] [ Prev] [ Next] [ Index] [ Report an Error]