Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

IDP Extended Package Configuration Overview

The Junos OS Intrusion Detection and Prevention (IDP) policy enables you to selectively enforce various attack detection and prevention techniques on network traffic passing through an IDP-enabled device. It allows you to define policy rules to match a section of traffic based on a zone, network, and application, and then take active or passive preventive actions on that traffic.

An IDP policy defines how your device handles the network traffic. It allows you to enforce various attack detection and prevention techniques on traffic traversing your network.

A policy is made up of rule bases, and each rule base contains a set of rules. You define rule parameters, such as traffic match conditions, action, and logging requirements, then add the rules to rule bases. After you create an IDP policy by adding rules in one or more rule bases, you can select that policy to be the active policy on your device.

To configure the IDP extended package (IPS-EP) perform the following steps:

  1. Enable IPS in a security policy. See Configuring IDP Policy Rules and IDP Rulebases.

  2. Configure IDP policy rules, IDP rule bases, and IDP rule actions. See Configuring IDP Policy Rules and IDP Rulebases.

  3. Configure IDP custom signatures. See IDP Signature-Based Attacks.

  4. Update the IDP signature database. See Intrusion Detection and Prevention Feature Guide for Security Devices.

Configure IPS Rules using the Protocols and Header Inspection Fields:

  • Configuring packet inspection against the following IPv4 fields:

    Fragment Offset:

    Header Checksum:

    IP Options:

  • Configuring packet inspection against the following IPv6 fields:

    Flow Label:

    Routing Header:

    Payload Length:

  • Configuring packet inspection against the following ICMPv4 fields:

    Checksum:

    Identification:

    Sequence Number:

  • Configuring packet inspection against the following ICMPv6 fields:

    Type:

    Code:

    Header Checksum:

  • Configuring packet inspection against the following TCP fields:

    Offset:

    TCP Flags:

    Checksum:

    TCP Options:

  • Configuring packet inspection against the following UDP fields:

    Checksum:

Configure IPS Rules for String-based Packet Matching against Packet Payload Data:

  • ICMPv4 string detection:

    ICMPv6 string detection:

    TCP: Detection of FTP commands:

    TCP: Detection of HTTP commands:

    TCP: Detection of HTTP URLs:

    TCP: Detection of SMTP states:

    UDP string detection:

  • Configure the throughput of an attack as follows:

    Checksum:

    For example:

    set firewall policer p1 if-exceeding bandwidth-limit 121120

For more information about how to configure Security Policy Schedulers, see Scheduling Security Policies.

For more information about how to configure Firewall Filters, see Firewall Filters Overview.

For more information about how to schedule Security Policies and Configuring Policers to Control Traffic Rates, see Scheduling Security Policies and Configuring Policers to Control Traffic Rates (CLI Procedure).