To access this page, select Configuration > Shared Objects > Application Signatures.
Use the Application Signatures page to view application signatures that are already downloaded and to create, modify, clone, and delete custom application signature groups. The Application Signatures page displays the name, object type, category and subcategory, risk associated with, and characteristics of the signature. You can create custom application signature groups with a set of similar signatures for consistent reuse when defining policies.
You can perform the following tasks from this page:
Table 144 provides guidelines on using the fields on the Application Signatures page.
Table 144: Fields on the Application Signatures Page
Field | Description |
|---|---|
Name | Name of the application signature or application signature group. |
Object Type | Signature type—either application signature or application signature group. |
Category | UTM category of the application signature. For example, the value of Category can be Messaging, Web, Infrastructure, Remote-Access, Multimedia, and so on. |
Subcategory | UTM subcategory of the application signature. For example, the value of Subcategory can be Wiki, File-Sharing, Multimedia, Social-Networking, News, and so on. |
Risk | Level of risk associated with the application signature. For example, the value of Risk can be Low, High, unsafe, and so on. |
Characteristic | One or more characteristics of the application signature. |
Predefined or Custom | A list of predefined application signatures and application signature groups, and a list of custom application signature groups that you created. |
© 2018 Juniper Networks, Inc. All rights reserved