Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

IPS Policy Signatures Main Page Fields

Use the IPS Policy Signatures main page to get an overall, high-level view of your IPS signature settings. You can filter and sort this information to get a better understanding of what you want to configure. Table 1 describes the fields on this page.

Table 1: IPS Policy Signatures Main Page Fields

Field

Description

Name

Name of the IPS signature.

Age of attack

Age of the attack (in years) to be used as a filter criteria to include IPS signatures as part of the dynamic group.

CVSS-Score

Common Vulnerability Scoring System (CVSS) to be used as a filter criteria to include IPS signatures as part of the dynamic group.

File Type

File type of the attack to be used as a filter criteria; for example, flash.

Vulnerability Type

Vulnerability type of the attack to be used as a filter criteria; for example, overflow.

Severity

Severity level of the attack that the signature will report.

Category

Category of the attack objects.

Object Type

Objects that are used in defining IDP policy rules.

Recommended

Predefined attacks recommended by Juniper Networks to the dynamic group.

Action

An IPS signature action taken when the monitored traffic matches the attack objects specified in the rules.

Pre-defined/Custom

Detected known attack patterns and protocol anomalies within the network traffic.

Domain

Domain name of security device. This information is auto-populated once you select the device. For example: global, system.