ON THIS PAGE
Step 3: Keep Going
Congratulations! You’re up and running with IDP! Let’s keep going and learn more about what you can do with the Juniper IDP solution.
What’s Next?
Now that your devices are subscribed to Juniper IDP, here are some things you can do next.
If you want to | Then |
---|---|
Continue configuring IDP policies for application identification | |
Configure Class of Service Action in an IDP Policy to manage multiple traffic profiles on the network | |
Configure IDP SSL Inspection to encrypt data, preventing unauthorized users from eavesdropping on electronic communications, and more | |
Configure TAP Mode for IDP so you can passively monitor traffic flows across the network via a switch SPAN or mirror port | See TAP Mode for IDP |
Learn how to configure IDP log attributes and monitor IDP | |
Learn more about Unified Policies | View the Introduction to Unified Policies video |
General Information
Here are some excellent resources that will help you take your Juniper IDP knowledge to the next level:
If you want to | Then |
---|---|
Find in-depth product documentation for IDP | Check out the Intrusion Detection and Prevention User Guide in the Juniper TechLibrary |
Understand the latest security advisories, and get a little extra help implementing your security solution | Take advantage of these awesome Juniper support resources: |
Learn about training and certification opportunities | Explore these options: |
Find out more about threat intelligence and understand the latest recommendations | Search IPS and application signature databases: |
See all documentation available for Junos OS | See the Junos OS Documentation |
Stay up to date on new and changed features and known and resolved issues | See the Junos OS Release Notes |
Ask your peers. Connect to labs. Find new learning opportunities | Visit the Intrusion Prevention Forum |