Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Signature Database Overview

The signature database that Juniper provides contains application and intrusion prevention system (IPS) signatures:

  • Application signatures are definitions of predefined attacks and applications, and can be used to identify applications for tracking firewall policies and quality-of-service (QoS) prioritization.

  • IPS signatures are definitions of predefined attack object and attack object groups that you can use in IDP policies to match traffic against known attacks.

Users with the tenant administrator role can install the active signature database on one or more devices.