IPS Policy Signatures Main Page Fields
Use the IPS Policy Signatures main page to get an overall, high-level view of your IPS signature settings. You can filter and sort this information to get a better understanding of what you want to configure. Table 1 describes the fields on this page.
Field |
Description |
---|---|
Name |
Name of the IPS signature. |
Age of attack |
Age of the attack (in years) to be used as a filter criteria to include IPS signatures as part of the dynamic group. |
CVSS-Score |
Common Vulnerability Scoring System (CVSS) to be used as a filter criteria to include IPS signatures as part of the dynamic group. |
File Type |
File type of the attack to be used as a filter criteria; for example, flash. |
Vulnerability Type |
Vulnerability type of the attack to be used as a filter criteria; for example, overflow. |
Severity |
Severity level of the attack that the signature will report. |
Category |
Category of the attack objects. |
Object Type |
Objects that are used in defining IDP policy rules. |
Recommended |
Predefined attacks recommended by Juniper Networks to the dynamic group. |
Action |
An IPS signature action taken when the monitored traffic matches the attack objects specified in the rules. |
Pre-defined/Custom |
Detected known attack patterns and protocol anomalies within the network traffic. |
Domain |
Domain name of security device. This information is auto-populated once you select the device. For example: global, system. |