[Contents] [Prev] [Next] [Index] [Report an Error]

Using Predefined Policy Templates

Juniper Networks provides predefined policy templates that you can use as a starting point for creating your own policies. Each template is set of rules of a specific rulebase type that you can copy and then update according to your requirements. These templates are available in the templates.xml file on a secured Juniper Networks Web site. To start using a template, you run command from the CLI to download and copy this file to a /var/db/scripts/commit directory.

Before You Begin

  1. For background information, read:
  2. Establish basic connectivity. For more information, see the Getting Started Guide for your device.
  3. Configure network interfaces. See the JUNOS Software Interfaces and Routing Configuration Guide.

Each policy template contains rules that use the default actions associated with the attack objects. You should customize these templates to work on your network by selecting your own source and destination addresses and choosing IDP actions that reflect your security needs.

Table 109 summarizes the predefined IDP policy templates provided by Juniper Networks.

Table 109: Predefined IDP Policy Templates

Template Name

Description

All With Logging

Includes all Attack Objects and enables packet logging for all rules.

All Without Logging

Includes all Attack Objects but does not enable packet logging.

DMZ Services

Protects a typical demilitarized zone (DMZ) environment.

DNS Server

Protects Domain Name System (DNS) services.

File Server

Protects file sharing services, such as Network File System (NFS), FTP, and others.

Getting Started

Contains very open rules. Useful in controlled lab environments, but should not be deployed on heavy traffic live networks.

IDP Default

Contains a good blend of security and performance.

Recommended

Contains only the attack objects tagged as recommended by Juniper Networks. All rules have their Actions column set to take the recommended action for each attack object.

Web Server

Protects HTTP servers from remote attacks.

To use predefined policy templates:

You can use either J-Web or the CLI configuration editor to configure an application set.

This topic contains:


[Contents] [Prev] [Next] [Index] [Report an Error]