- play_arrow Juniper Web Device Manager
- play_arrow Getting Started
-
- play_arrow Add SRX Series Firewall to Security Director Cloud
- play_arrow Dashboard
- play_arrow J-Web Dashboard
-
- play_arrow Monitor
- play_arrow Network
- play_arrow Logs
- play_arrow Maps and Charts
- play_arrow Statistics
- play_arrow Reports
-
- play_arrow Device Administration
- play_arrow Basic Settings
- play_arrow Cluster Management
- play_arrow User & Roles
- play_arrow Multi Tenancy—Resource Profiles
- play_arrow Multi Tenancy—Interconnect Ports
- play_arrow Multi Tenancy—Logical Systems
- play_arrow Multi Tenancy—Tenants
- play_arrow Certificate Management—Device Certificates
- play_arrow Certificate Management—Trusted Certificate Authority
- About the Trusted Certificate Authority Page
- Generate Default Trusted Certificate Authorities
- Enroll a CA Certificate
- Import a CA Certificate
- Add a Certificate Authority Profile
- Edit a Certificate Authority Profile
- Delete a Certificate Authority Profile
- Search Text in the Trusted Certificate Authority Table
- play_arrow Certificate Management—Certificate Authority Group
- play_arrow License Management
- play_arrow Security Package Management
- play_arrow ATP Management
- play_arrow Operations
- play_arrow Software Management
- play_arrow Configuration Management
- play_arrow Alarm Management
- play_arrow RPM
- play_arrow Tools
- play_arrow Reset Configuration
-
- play_arrow Network
- play_arrow Connectivity—Interfaces
- play_arrow Connectivity—VLAN
- play_arrow Connectivity—Link Aggregation
- play_arrow Connectivity—Wireless LAN
- play_arrow DHCP Client
- play_arrow DHCP Server
- play_arrow Firewall Filters—IPv4
- play_arrow Firewall Filters—IPv6
- play_arrow Firewall Filters—Assign to Interfaces
- play_arrow NAT Policies
- play_arrow NAT Pools
- play_arrow Destination NAT
- play_arrow Static NAT
- play_arrow NAT Proxy ARP/ND
- play_arrow Static Routing
- play_arrow RIP Routing
- play_arrow OSPF Routing
- play_arrow BGP Routing
- play_arrow Routing Instances
- play_arrow Routing—Policies
- play_arrow Routing—Forwarding Mode
- play_arrow CoS—Value Aliases
- play_arrow CoS—Forwarding Classes
- play_arrow CoS Classifiers
- play_arrow CoS—Rewrite Rules
- play_arrow CoS—Schedulers
- play_arrow CoS—Scheduler Maps
- play_arrow CoS—Drop Profile
- play_arrow CoS—Virtual Channel Groups
- play_arrow CoS—Assign To Interface
- play_arrow Application QoS
- play_arrow IPsec VPN
- play_arrow Manual Key VPN
- play_arrow Dynamic VPN
-
- play_arrow Security Services
- play_arrow Content Security Default Configuration
- play_arrow Content Security Antivirus Profiles
- play_arrow Content Security Web Filtering Profiles
- play_arrow Content Security Antispam Profiles
- play_arrow Content Security Content Filtering Profiles
- play_arrow Content Security Custom Objects
- play_arrow Content Security Policies
- play_arrow IPS Policies
- play_arrow IPS Signatures
- play_arrow IPS Sensor
- play_arrow ALG
- play_arrow Metadata Streaming Profile
- play_arrow ATP Anti-malware
- play_arrow ATP SecIntel Profiles
- About the SecIntel Profiles Page
- Configure DNS Sinkhole
- Create a Command and Control Profile
- Edit a Command and Control Profile
- Delete a Command and Control Profile
- Create a DNS Profile
- Edit a DNS Profile
- Delete a DNS Profile
- Create an Infected Hosts Profile
- Edit an Infected Hosts Profile
- Delete an Infected Hosts Profile
- play_arrow ATP SecIntel Profile Groups
- play_arrow SSL Initiation Profiles
- play_arrow SSL Proxy Profiles
- play_arrow Firewall Authentication—Access Profile
- play_arrow Firewall Authentication—Address Pools
- play_arrow Firewall Authentication Settings
- play_arrow Firewall Authentication—UAC Settings
- play_arrow Firewall Authentication—Active Directory
- play_arrow Firewall Authentication—Local Authentication
- play_arrow Firewall Authentication—Authentication Priority
- play_arrow Firewall Authentication—JIMS
- play_arrow ICAP Redirect
-
Add Application Signatures
You are here: Security Policies & Objects > Dynamic Applications.
To add an application signature:
Field | Action |
---|---|
Name | Enter the application signature name. |
Description | Enter the application signature description. |
Order | Enter the order of the custom application. Lower order has higher priority. The range is 1 through 50,000. |
Priority | Enter the priority over other signature applications. Select an option from the list:
By default, the priority for the custom application is set to Low. This allows a predefined application to take precedence. If you want to override a predefined application, you must set the priority to High. |
Risk | Enter the risk as critical, high, moderate, low, or unsafe. |
Application Identification match criteria | Select one or more options from the list:
|
ICMP Mapping | Select a value from the list.
|
IP Protocol Mapping | Select the numeric value of an ICMP type. The type identifies the ICMP message, such as Unassigned or Destination Unreachable. The range is from 0 through 254. |
Address Mapping | To add a new address mapping:
|
L7 Signature | |
Cacheable | Set this option to True only when L7 signatures are configured in a custom signature. This option is not supported for address-based, IP protocol-based, and ICMP-based custom application signatures. |
Add L7 Signature | Click Add L7 Signature list and select an option from the following:
The Add Signature page appears. |
Add Signature | |
Over Protocol | Displays the signature that matches the application protocol. Example: HTTP |
Signature Name | Enter a unique name that is a string of alphanumeric characters, colons, periods, dashes, and underscores. No spaces are allowed and the maximum length is 63 characters. |
Port Range | Enter the port range for the application. Range is 0-65535. |
Add Members Custom signatures can contain multiple members that define attributes of an application. The supported member name range is m01 through m15. | |
+ | Click + to create a member. |
Context (Over HTTP) | Select the service-specific context from the following list:
|
Context (Over SSL) | Select the service-specific context as ssl-server-name. |
Context (Over TCP) | Select the service-specific context as stream. |
Context (Over UDP) | Select the service-specific context as stream. |
Direction | Select the direction of the packet flow to match the signature:
|
Depth | Enter the maximum number of bytes to check for context match. Use the byte limit for AppID to identify custom application pattern for applications running over TCP or UDP or Layer 7 applications. Range is 1 through 8000. The Depth is set to 1000 by default, if not explicitly configured. Note: Starting in Junos OS Release 20.2R1, Depth option is supported. |
Pattern | Enter the deterministic finite automaton (DFA) pattern matched the context. The DFA pattern specifies the pattern to be matched for the signature. The maximum length is 128. |
Change History Table
Feature support is determined by the platform and release you are using. Use Feature Explorer to determine if a feature is supported on your platform.