Configuring Application Rulebase Rules (NSM Procedure)
The Application Policy Enforcement (APE) rulebase enables you to limit bandwidth for specified users and/or applications. You can configure APE rules to detect network traffic based on application signatures. The user can define custom application signatures to be used in the APE rules. The APE rulebase enables actions based on an application-centered matching tuple.
To configure an APE rulebase rule:
- In the NSM navigation tree, select Policy Manager > Security Policies.
- Select and double-click the security policy to which you want to add the APE rulebase rule.
- Click New in the upper right corner of the policy viewer and select Add Application Rulebase.
- Click the New button within the rules viewer to add a rule.
- Modify the property of the rule by right-clicking the table cell for the property and making your modifications.
- Configure or modify the rule using the settings described in Table 1.
- Click OK to save your changes.
Table 1: APE Rulebase Rule Properties
Option | Function | Your Action |
---|---|---|
No. | Specifies if you want to add, delete, copy, or reorder rules. | Right-click the table cell for the rule number and make your required modifications. |
Match > Source | Specifies the address object that is the source of the traffic. | Select any to monitor network traffic originating from any IP address. Note: For guidelines on specifying match parameters, see the IDP Concepts and Examples Guide. |
Match > User Role | Specifies the user roles to match the session for the rule to be applied. If a value for User Role matches, the Source parameter is not consulted. Matching based on user role depends on integration with a compatible Juniper Networks IC Series Unified Access Control appliance. | Right-click the table cell to select user roles. |
Match > Destination | Specifies the address object that is the destination of the traffic, typically a server or other device on your network. | Select the destination object. Note: You can also negate one or more address objects to specify all destinations except the excluded object. |
Match > Service | Requires a match of one of the specified services. A single rule can match a service object definition or an application list, but not both. We recommend you create rules that match an application list whenever possible. Matching based on application uses the application identification feature, which can identify the application regardless of port. We support rules that match service object definitions for cases where there is not a suitable application object. | Right-click the table cell and select any one of the required options. If you specify named values for both service and application, only the application value is used. If your rule includes application or extended application objects, specify Default for the service parameter. If you do not want to match on service or application list, specify Any for all three (service, application, and extended application). If there are no suitable application objects, create a rule that uses the service object and set the application and extended application columns to Any. Note: If the service uses standard ports, you can select from predefined services. If the service uses nonstandard ports, you can create a custom service object. The IDP engine can inspect services that use TCP, UDP, RPC, and ICMP transport layer protocols. |
Match > Application | Requires one of the specified applications to match the session for the rule to be applied. The predefined list of applications is populated by the application identification feature. The application identification feature identifies the application regardless of port. Port-independent application identification simplifies rule configuration and ensures that you do not miss applications running on nonstandard ports. Hence it is recommended to use the application parameter instead of the service parameter whenever possible. | Right-click the table cell and make your required modifications. If you specify named values for both service and application, only the application value is used. Specify Any when creating a service-based rule or when creating an application-based rule where the application list consists only of extended application objects. You can use the Shared Objects for Policy viewer (located below the rule editor) to browse application objects and explore object properties. You can create custom application objects. Note: To apply an APE action to all traffic matching source and destination parameters, set both the service parameter and the application parameter to Any. Extended application matching is more granular than application matching. Do not select HTTP in the application column if you also plan to specify extended application objects in the same rule. If you specify HTTP and HTTP:Facebook, for example, the rule matches HTTP or HTTP:Facebook. The result is indistinguishable from a rule matching only HTTP. We recommend you list rules targeting Extended Applications before a rule targeting HTTP. |
Match > Extended Application | Requires one of the specified extended applications to match the session for the rule to be applied. Extended applications are also called nested applications. The Juniper Networks Security Center (J-Security Center) provides predefined application signatures for many Web 2.0 applications running over HTTP. Matching on these signatures depends on the application identification feature, which is enabled by default. You use the Application and Extended Application columns to build a list of applications to match the rule. The list is evaluated as a Boolean OR, so if one of the application or extended application objects specified in the rule is identified, the “service or application” component of the tuple matches. | Right-click the table cell and make your required modifications. Specify Any when you are creating a service-based rule or when you are creating an application-based rule where the application list consists only of application objects. Note: You can use the Shared Objects for Policy viewer (located below the rule editor) to browse extended application objects and explore object properties. You cannot create custom extended application objects. |
Action | Specifies which actions to perform against attacks that match rules in your security policy. | Right-click the table cell and select any one of the following options:
|
Notification | Specifies logging options. Packet capture is not applicable for APE rulebase rules. | Right-click the table cell and select Configure to display a dialog box where you can configure logging options. |
VLAN Tag | Specifies rules to traffic on certain VLANs. Normally, for a rule to take effect, it must match the packet source, destination, service, and attack objects. If the VLAN cell is populated with a value other than any, then the rule will also consider the packet’s VLAN tag when determining a match. | Right-click the table cell to assign a VLAN object to a rule or to set the VLAN tag value to none. |
Install On | Specifies target IDP devices for the rule. By default, IDP security policy rules can be applied to any IDP device. | Right-click the table cell and select Select Target to display a dialog box to specify the IDP devices to which the rule can be installed. |
Comments | Adds notations about the rule. This setting is optional and does not affect the functionality of the security policy rule. | Right-click the table cell and select Edit Comments to display a dialog box where you can make notations about the rule. |
You can verify the APE rulebase functionality in your lab and view APE related statistics in the Command-Line Interface (CLI). It is recommended that you retain defaults for APE rulebase. By default:
- IDP does not limit the rate of sessions that do not match APE rules. Rate limiting is done by service based till application is identified in the session i.e. default services running on the port.
- When the application identification feature fails to identify the application, IDP does not try to match the rule but instead applies the default rate limit (if any). You can modify this so that in cases where application identification fails, IDP attempts to match the session to the standard protocol and port for the application.
For more information, see the IDP Concepts & Examples guide.