Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All
     

    Related Documentation

     

    Understanding Logical System Application Identification Services

    Predefined and custom application signatures identify an application by matching patterns in the first few packets of a session. Identifying applications provides the following benefits:

    • Allows Intrusion Detection and Prevention (IDP) to apply appropriate attack objects to applications running on nonstandard ports.
    • Improves performance by narrowing the scope of attack signatures for applications without decoders.
    • Enables you to create detailed reports using AppTrack on applications passing through the device.

    With logical systems, predefined and custom application signatures are global resources that are shared by all logical systems. The master administrator is responsible for downloading and installing predefined Juniper Networks application signatures and creating custom application and nested application signatures to identify applications that are not part of the predefined database.

    Application identification is enabled by default.

    The application system cache (ASC) saves the mapping between an application type and the corresponding destination IP address, destination port, protocol type, and service. Each user logical system has its own ASC. A user logical system administrator can display the ASC entries for their logical system with the show services application-identification application-system-cache command. A user logical system administrator can use the clear services application-identification application-system-cache command to clear the ASC entries for their logical system.

    The master administrator can display or clear ASC entries for any logical system. The master administrator can also display or clear global counters with the show services application-identification counter and clear services application-identification counter commands.

     

    Related Documentation

     

    Published: 2012-06-29