IPS Policy Signatures Main Page Fields
Use the IPS Policy Signatures main page to get an overall, high-level view of your IPS signature settings. You can filter and sort this information to get a better understanding of what you want to configure. Table 1 describes the fields on this page.
Table 1: IPS Policy Signatures Main Page Fields
Name of the IPS signature.
Age of attack
Age of the attack (in years) to be used as a filter criteria to include IPS signatures as part of the dynamic group.
Common Vulnerability Scoring System (CVSS) to be used as a filter criteria to include IPS signatures as part of the dynamic group.
File type of the attack to be used as a filter criteria; for example, flash.
Vulnerability type of the attack to be used as a filter criteria; for example, overflow.
Severity level of the attack that the signature will report.
Category of the attack objects.
Objects that are used in defining IDP policy rules.
Predefined attacks recommended by Juniper Networks to the dynamic group.
An IPS signature action taken when the monitored traffic matches the attack objects specified in the rules.
Detected known attack patterns and protocol anomalies within the network traffic.
Domain name of security device. This information is auto-populated once you select the device. For example: global, system.