Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Application Objects in Intrusion Detection and Prevention Security Policies Overview

    Application objects are stored in the NSM database application signature table (also referred to as the appsig table) and extended application signature table (also referred to as the extappsig table). Juniper Networks Security Center (J-Security Center) develops predefined application signatures and makes them available for download to NSM during updates to the signature database. You use the NSM Object Manager to manage application objects. When you push security policy updates, the application signatures are pushed to the IDP Series device. During traffic inspection, the application identification feature matches traffic to the application objects that are specified in APE rules.

    IDP Series administration can include the following tasks related to application objects:

    • Updating the application signature table
    • Viewing predefined application object definitions
    • Creating custom application objects
    • Working with application object groups

    For information about how to use NSM Object Manager search features, see the NSM online Help.

    Published: 2013-01-03