Related Documentation
- J Series
- Understanding IDP Policy Rulebases in the Junos OS Security Configuration Guide

- Understanding IDP Protocol Decoders in the Junos OS Security Configuration Guide

- Understanding IDP Inline Tap Mode in the Junos OS Security Configuration Guide

- Understanding Multiple IDP Detector Support in the Junos OS Security Configuration Guide

- Understanding IDP Logging in the Junos OS Security Configuration Guide

- SRX Series
- Understanding IDP Policy Rulebases in the Junos OS Security Configuration Guide

- Understanding IDP Protocol Decoders in the Junos OS Security Configuration Guide

- IDP SSL Overview in the Junos OS Security Configuration Guide

- Understanding IDP Inline Tap Mode in the Junos OS Security Configuration Guide

- Understanding Multiple IDP Detector Support in the Junos OS Security Configuration Guide

- Understanding IDP Logging in the Junos OS Security Configuration Guide

- Additional Information
- Junos OS Feature Support Reference for SRX Series and J Series Devices

- Understanding IDP Policy Rulebases in the Junos OS Security Configuration Guide

- Understanding IDP Protocol Decoders in the Junos OS Security Configuration Guide

- IDP SSL Overview in the Junos OS Security Configuration Guide

- Understanding IDP Inline Tap Mode in the Junos OS Security Configuration Guide

- Understanding Multiple IDP Detector Support in the Junos OS Security Configuration Guide

- Understanding IDP Logging in the Junos OS Security Configuration Guide

Understanding IDP Features in Logical Systems
This topic includes the following sections:
Rulebases
A single IDP policy can contain only one instance of any type of rulebase. The following IDP rulebases are supported for logical systems:
- The Intrusion prevention system (IPS) rulebase uses attack objects to detect known and unknown attacks. It detects attacks based on stateful signature and protocol anomalies.
- The application-level distributed denial-of-service (DDoS) rulebase defines parameters to protect servers such as DNS or HTTP. The application-level DDoS rulebase defines the source match condition for traffic that should be monitored and takes an action, such as drop the connection, drop the packet, or no action. It can also perform actions against future connections that use the same IP address.
![]() | Note: Status monitoring for IPS and application-level DDoS is global to the device and not on a per logical system basis. |
Protocol Decoders
The Junos IDP module ships with a set of preconfigured protocol decoders. These protocol decoders have default settings for various protocol-specific contextual checks that they perform. The IDP protocol decoder configuration is global and applies to all logical systems. Only the master administrator at the root level can modify the settings at the [edit security idp sensor-configuration] hierarchy level.
SSL Inspection
IDP SSL inspection uses the Secure Sockets Layer (SSL) protocol suite to enable inspection of HTTP traffic encrypted in SSL.
SSL inspection configuration is global and applies to all logical systems on a device. SSL inspection can only be configured by the master administrator at the root level with the ssl-inspection configuration statement at the [edit security idp sensor-configuration] hierarchy level.
Inline Tap Mode
The inline tap mode feature provides passive, inline detection of Application Layer threats for traffic matching security policies that have the IDP application service enabled. When a device is in inline tap mode, packets pass through firewall inspection and are also copied to the independent IDP module. This allows the packets to get to the next service module without waiting for IDP processing results.
Inline tap mode is enabled or disabled for all logical systems at the root level by the master administrator. To enable inline tap mode, use the inline-tap configuration statement at the [edit security forwarding-process application-services maximize-idp-sessions] hierarchy level. Delete the inline tap mode configuration to switch the device back to regular mode.
![]() | Note: The device must be restarted when switching to inline tap mode or back to regular mode. |
Multi-Detectors
When a new IDP security package is received, it contains attack definitions and a detector. After a new policy is loaded, it is also associated with a detector. If the policy being loaded has an associated detector that matches the detector already in use by the existing policy, the new detector is not loaded and both policies use a single associated detector. But if the new detector does not match the current detector, the new detector is loaded along with the new policy. In this case, each loaded policy will then use its own associated detector for attack detection.
The version of the detector is common to all logical systems.
Logging and Monitoring
Status monitoring options are available to the master administrator only. All status monitoring options under the show security idp and clear security idp CLI operational commands present global information, but not on a per logical system basis.
![]() | Note: SNMP monitoring for IDP is not supported on logical systems. |
IDP generates event logs when an event matches an IDP policy rule in which logging is enabled.
The logical systems identification is added to the following types of IDP traffic processing logs:
- Attack logs. The following example shows an attack log
for the ls-product-design logical system:
Oct 12 17:33:32 8.0.0.254 RT_IDP: IDP_ATTACK_LOG_EVENT_LS: IDP: In ls-product-design at 1286930013, SIG Attack log <4.0.0.1/34327->5.0.0.1/21> for TCP protocol and service SERVICE_IDP application NONE by rule 1 of rulebase IPS in policy Recommended. attack: repeat=0, action=IGNORE, threat-severity=MEDIUM, name=FTP:USER:ROOT, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:ls-product-design-untrust:ge-0/0/0.0->ls-product-design-trust:ge-0/0/1.0, packet-log-id: 65535 and misc-message -
- IP action logs. The following example shows an IP action
log for the ls-product-design logical system:
Oct 13 16:56:04 8.0.0.254 RT_IDP: IDP_ATTACK_LOG_EVENT_LS: IDP: In ls-product-design at 1287014163, TRAFFIC Attack log <25.0.0.1/34802->15.0.0.1/21> for TCP protocol and service SERVICE_NONE application NONE by rule 1 of rulebase IPS in policy Recommended. attack: repeat=0, action=TRAFFIC_IPACTION_NOTIFY, threat-severity=INFO, name=_, NAT <0.0.0.0:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:ls-product-design-trust:ge-0/0/1.0->ls-product-design-untrust:plt0.3, packet-log-id: 0 and misc-message -
- Application DDoS logs. The following example shows an
application DDoS log for the ls-product-design logical system:
Oct 11 16:29:57 8.0.0.254 RT_IDP: IDP_APPDDOS_APP_ATTACK_EVENT_LS: DDOS Attack in ls-product-design at 1286839797 on my-http, <ls-product-design-untrust:ge-0/0/0.0:4.0.0.1:33738->ls-product-design-trust:ge-0/0/1.0:5.0.0.1:80> for TCP protocol and service HTTP by rule 1 of rulebase DDOS in policy Recommended. attack: repeats 0 action DROP threat-severity INFO, connection-hit-rate 0, context-name http-url-parsed, hit-rate 6, value-hit-rate 6 time-scope PEER time-count 2 time-period 10 secs, context value: ascii: /abc.html hex: 2f 61 62 63 2e 68 74 6d 6c
Related Documentation
- J Series
- Understanding IDP Policy Rulebases in the Junos OS Security Configuration Guide

- Understanding IDP Protocol Decoders in the Junos OS Security Configuration Guide

- Understanding IDP Inline Tap Mode in the Junos OS Security Configuration Guide

- Understanding Multiple IDP Detector Support in the Junos OS Security Configuration Guide

- Understanding IDP Logging in the Junos OS Security Configuration Guide

- SRX Series
- Understanding IDP Policy Rulebases in the Junos OS Security Configuration Guide

- Understanding IDP Protocol Decoders in the Junos OS Security Configuration Guide

- IDP SSL Overview in the Junos OS Security Configuration Guide

- Understanding IDP Inline Tap Mode in the Junos OS Security Configuration Guide

- Understanding Multiple IDP Detector Support in the Junos OS Security Configuration Guide

- Understanding IDP Logging in the Junos OS Security Configuration Guide

- Additional Information
- Junos OS Feature Support Reference for SRX Series and J Series Devices

- Understanding IDP Policy Rulebases in the Junos OS Security Configuration Guide

- Understanding IDP Protocol Decoders in the Junos OS Security Configuration Guide

- IDP SSL Overview in the Junos OS Security Configuration Guide

- Understanding IDP Inline Tap Mode in the Junos OS Security Configuration Guide

- Understanding Multiple IDP Detector Support in the Junos OS Security Configuration Guide

- Understanding IDP Logging in the Junos OS Security Configuration Guide



