Help Center User GuideGetting StartedFAQRelease Notes
 
X
User Guide
Getting Started
FAQ
Release Notes
Contents  

About the Application Signatures Page

To access the Application Signatures page, select Configuration > Shared Objects > Application Signatures.

Use this page to view application signatures and application signature groups that are already downloaded and to create, modify, clone, and delete custom application signatures and custom application signature groups. This page displays the name, object type, category and subcategory, risk associated with, and characteristics of the signature. You can create custom application signatures and custom application signature groups with a set of similar signatures for consistent reuse when defining policies.

Tasks You Can Perform

You can perform the following tasks from this page:

Field Descriptions

Table 114 describes the fields on the Application Signatures page.

Table 114: Fields on the Application Signatures Page

Field

Description

Name

Name of the application signature or application signature group.

Object Type

Signature type—either application signature or application signature group.

Category

UTM category of the application signature. For example, the value of Category can be Messaging, Web, Infrastructure, Remote-Access, Multimedia, and so on.

Subcategory

UTM subcategory of the application signature. For example, the value of Subcategory can be Wiki, File-Sharing, Multimedia, Social-Networking, News, and so on.

Risk

Level of risk associated with the application signature. For example, the value of Risk can be low, moderate, high, critical, unsafe, and so on.

Characteristic

One or more characteristics of the application signature. For example, supports file transfer, loss of productivity, and so on.

Predefined or Custom

A list of predefined application signatures and application signature groups, and a list of custom application and custom application signature groups that you created.

Cacheable

Indicates whether the information related to an application signature is cacheable (True) or non-cacheable (False).

Related Documentation

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit