Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Signature Database Overview

Release: Contrail Service Orchestration 6.3.0
{}
Change Release
date_range 30-Sep-21

The signature database that Juniper provides contains application and intrusion prevention system (IPS) signatures:

  • Application signatures are definitions of predefined attacks and applications, and can be used to identify applications for tracking firewall policies and quality-of-service (QoS) prioritization.

  • IPS signatures are definitions of predefined attack object and attack object groups that you can use in IDP policies to match traffic against known attacks.

Users with the tenant administrator role can install the active signature database on one or more devices.

footer-navigation