Snort IPS Signatures
Juniper Networks IDP supports Snort IPS signatures. You can convert the Snort IPS rules into Juniper IDP custom attack signatures using the Juniper Integration of Snort Tool (JIST). These Snort IPS rules help detect malicious attacks.
IDP secures your network by using signatures that help to detect attacks. Snort is an open-source intrusion prevention system (IPS).
Figure 1: Snort IPS Signatures

Benefits of Snort IPS Signatures
- Help detect malicious attacks.
How Snort IPS works?
The JIST tool in Junos OS enables seamless integration with the following actions:
- JIST is included in Junos OS by default. The tool supports Snort version 2 and version 3 rules.
- JIST converts the Snort rules with snort-ids into equivalent custom attack signatures on Junos OS with respective snort-ids as the custom attack names.
- When you run the
request
command with Snort IPS rules, JIST generatesset
commands equivalent to the Snort IPS rules. Use therequest security idp jist-conversion
command to generate theset
commands as CLI output. To load theset
commands, use theload set terminal
statement or copy and paste the commands in the configuration mode, and then commit. You can then configure the existing IDP policy with the converted custom attack signatures. - All the Snort IPS rule files that didn’t get converted are written to /tmp/jist-failed.rules. The error log files generated during the conversion are written to /tmp/jist-error.log.
- To view the jist-package version, use the
show security idp jist-package-version
command.