Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Using the Recommended Security Policy

    The highly respected Juniper Networks Security Center team (J-Security Center) provides the default IDP security policy–named Recommended. We advise that you use this policy (or customize it) to protect your network from the likeliest and most dangerous attacks.

    Table 1 summarizes the properties of the Recommended security policy.

    Property

    Value

    Rulebase

    IDP rulebase

    Rules

    Nine rules, distinguished by attack object

    Source

    Any

    Service

    Default, meaning the matching property is based on the service bindings of the attack object specified by the rule

    Destination

    Any

    Attack objects

    Recommended IP, Recommended TCP, Recommended ICMP, Recommended HTTP, Recommended SMTP, Recommended DNS, Recommended FTP, Recommended POP3, Recommended IMAP, Recommended Trojan, Recommended Virus, Recommended Worm

    Note: All of the attack objects included in the predefined policies are client-to-server attacks.

    Action

    Recommended, meaning the action is specified by the attack object

    Notification

    Logging

    If you prefer, you can copy this security policy and use it as a template for a custom security policy tailored for your network.


    Published: 2011-02-08