Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

IDP Policies

The Junos OS Intrusion Detection and Prevention (IDP) policy enables you to selectively enforce various attack detection and prevention techniques on network traffic passing through an IDP-enabled device. It allows you to define policy rules to match a section of traffic based on a zone, network, and application, and then take active or passive preventive actions on that traffic.

For more information, see the following topics:

IDP Policies Overview

An IDP policy defines how your device handles the network traffic. It allows you to enforce various attack detection and prevention techniques on traffic traversing your network.

A policy is made up of rule bases, and each rule base contains a set of rules. You define rule parameters, such as traffic match conditions, action, and logging requirements, then add the rules to rule bases. After you create an IDP Policy by adding rules in one or more rule bases, you can select that policy to be the active policy on your device.

Junos OS allows you to configure and apply multiple IDP policies. Starting with Junos OS Release 15.1X49-D20 and Junos OS Release 17.3R1, validation of configurations is done for the IDP policy that is configured as an active policy. You can install the same IDP policy on multiple devices, or you can install a unique IDP policy on each device in your network. A single policy can contain only one instance of any type of rule base.

Note:

The IDP feature is enabled by default. No license is required. Custom attacks and custom attack groups in IDP policies can also be configured and installed even when a valid license and signature database are not installed on the device.

Starting in Junos OS Release 18.4R1, when a new IDP policy is loaded, the existing sessions are inspected using the newly loaded policy and the existing sessions not ignored for IDP processing.

The following list described the IDP inspection changes for the existing sessions after a new policy is loaded:

  • Packet-based signatures - IDP inspection continues for packet-based attacks with the new IDP policy.

  • Stream-based signatures - IDP inspection continues for stream-based attacks from the new IDP policy with the end offset number less than the number of bytes passed for that flow.

  • Context-based signatures - IDP inspection continues for context-based attacks created by the detector after a new IDP policy is loaded, with an exception that the new policy that is loaded with the new detector.

The following IDP policies are supported:

  • DMZ_Services

  • DNS_Services

  • File_Server

  • Getting_Started

  • IDP_Default

  • Recommended

  • Web_Server

You can perform the following tasks to manage IDP policies:

  • Create new IDP policies starting from scratch. See Example: Defining Rules for an IDP IPS RuleBase.

  • Create an IDP policy starting with one of the predefined templates provided by Juniper Networks (see Understanding Predefined IDP Policy Templates).

  • Add or delete rules within a rule base. You can use any of the following IDP objects to create rules:

    • Zone

      Note:

      You can configure source-address and source-except addresses when from-zone is any, and similarly to have destination-address and destination-except addresses when to-zone is any.

    • Network objects available in the base system

    • Predefined service objects provided by Juniper Networks

    • Custom application objects

    • Predefined attack objects provided by Juniper Networks

  • Create custom attack objects (see Example: Configuring IDP Signature-Based Attacks ).

  • Update the signature database provided by Juniper Networks. This database contains all predefined objects.

  • Maintain multiple IDP policies. Any one of the policies can be applied to the device.

The IDP policies for each user logical system are compiled together and stored on the data plane memory. To estimate adequate data plane memory for a configuration, consider these two factors:

  • IDP policies applied to each user logical system are considered unique instances because the ID and zones for each user logical system are different. Estimates need to consider the combined memory requirements for all user logical systems.

  • As the application database increases, compiled policies requires more memory. Memory usage should be kept below the available data plane memory to allow for database increases.

Understanding IDP Policy Support for Unified Policies

With the support of IDP policy within unified security policy:

  • IDP policy is activated using the set security policies from-zone <zone-name> to-zone <zone-name> policy <policy-name> then permit application-services idp-policy <idp-policy-name> command.

  • With the IDP policy being made available within the unified security policy all the IDP matches will be handled within the unified policy unless explicit source, destination, or application is defined (traditional policy).

  • You can additionally configure match conditions in IDP to achieve additional inspection granularity.

  • Configuring source or destination address, source and destination-except, from and to zone, or application is not required with unified policy, as the match happens in the security policy itself.

  • Layer 7 application might get changed during a session lifetime and this application change might lead to disabling of IDP service for the session.

  • Initial security policy match might result in single or multiple policy matches. As a part of session interest check IDP will be enabled if IDP policy is present in any of the matched rules.

If you have configured a traditional security policy (with 5-tuples matching condition or dynamic-application configured as none) and an unified policy (with 6-tuple matching condition), the traditional security policy matches the traffic first, prior to the unified policy.

When you configure a unified policy with a dynamic application as one of the matching condition, the configuration eliminates the additional steps involved in IDP policy configuration. All the IDP policy configurations are handled within the unified security policy and simplifies the task of configuring IDP policy to detect any attack or intrusions for a given session.

Understanding Multiple IDP Policies for Unified Policies

When security devices are configured with unified policies, you can configure multiple IDP policies and set one of those policies as the default IDP policy

If multiple IDP policies are configured for a session and when policy conflict occurs, the device applies the default IDP policy for that session and thus resolves any policy conflicts.

Note:

If you have configured two or more IDP policies in a unified security policy, then you must configure the default IDP policy.

To configure the IDP policy as the default policy, use the set security idp default-policy policy-name command.

The initial security policy lookup phase, which occurs prior to a dynamic application being identified, might result in multiple potential policy matches. IDP is enabled on the session if at least one of the matched security policies have an IDP policy configured.

If only one IDP policy is configured in the potential policy list, then that IDP policy is applied for the session.

If there are multiple IDP policies configured for a session in the potential policy list, then the device applies the IDP policy that is configured as default the IDP policy.

After dynamic applications are identified for a session, if the final matched policy has IDP polices configured that are different from the default IDP policy, then policy relookup is performed, and the IDP policy configured for the final matched policy is applied.

If the final matched security policy has the same IDP policy that was configured during the initial security policy lookup, then that IDP policy is applied for the session.

If the final matched security policy does not have an IDP policy configured, then IDP processing is disabled for the session.

Benefits of Multiple IDP Policies and Default IDP Policy Configuration for Unified Policies

  • Provides the flexibility to maintain and use multiple IDP policies.

  • Handles policy conflicts using the default IDP policy configuration.

IDP Policy Selection for Unified Policies

This topic provides details on IDP policy selection for unified policies.

IDP Policy Selection with a Single IDP Policy

When a security policy is processed for a session, initial security policy match might result in single or multiple policy matches. If application cache is present, policy match will result in single policy match.

As a part of the session interest check, IDP is enabled if an IDP policy is present in any of the matched rules.

After dynamic application identification is performed, policy relookup is performed by the security policy. Layer 7 application services (IDP) are informed to disable themselves, if IDP is not configured on the final matched policy. With the IDP policy being made available within the unified security policy, all the IDP matches are handled within the unified policy unless explicit source, destination, or application is defined (traditional policy). Configuring source or destination address, source and destination-except, from and to zone, or application is not required with unified policy, because the match happens in the security policy itself. Table 1 provides example of IDP policy selection within a security policy.

Figure 1 and Figure 2 provide the workflow details for single and multiple IDP policy selection for unified policies.

Table 1: Example of Policy Selection Within a Security Policy
Security Policy Source Zone Source Address Destination Zone Destination Address Dynamic Application Application service Policies

P1

In

10.1.1.1

Out

Any

HTTP

IDP

Recommended

P2

In

10.1.1.1

Out

Any

GMAIL

UTM

utm_policy_1

Figure 1: IDP Processing for Flow First PathIDP Processing for Flow First Path
Figure 2: IDP Processing After Final Policy LookupIDP Processing After Final Policy Lookup

IDP Policy Selection with Multiple IDP Policies

If there are multiple policies present in the potential policy list with different IDP policies, then the device applies the IDP policy that is configured as default IDP policy.

After dynamic applications are identified, if the final matched policy has IDP polices configured that are different from the default IDP policy, then policy re-lookup is performed, and the IDP policy configured for the final matched policy is applied.

If the final matched security policy does not have an IDP policy configured, then IDP processing is disabled for the session.

Table 2: Example of Policy Selection within a Security Policy
Policy Source Zone Source Address Destination Zone Destination Address Dynamic Application Application service Policies

P1

In

10.1.1.1

Out

Any

HTTP

IDP

recommended

P2

In

10.1.1.1

Out

Any

GMAIL

UTM

utm_policy_1

P3

In

any

Out

Any

GMAIL

IDP

idpengine

Considering the example security policies configured for a session:

  • If security policy P1 and policy P3 match for a session

    IDP Policy conflict is observed. So, the IDP policy that is configured as default IDP policy is applied in this case.

    After the final security policy match, IDP policy re-lookup is performed based on matched IDP policies. If the final matched security policy is policy P1, then IDP policy which is named recommended is applied for the session.

  • If security policy P1 and policy P2 match for a session

    Since there is only one IDP policy configured in the matched security policies, IDP policy which is named recommended is applied for the session.

    If the final matched security policy is policy P1 then the session inspection continues to apply IDP policy named recommended. If the final matched security policy is policy P2 then IDP is disabled and ignores the session.

Example: Configuring Multiple IDP Policies and a Default IDP Policy for Unified Security Policies

For transit traffic to pass through IDP inspection, you configure a security policy and enable IDP application services on all traffic that you want to inspect.

This example shows how to configure a security policy to enable IDP services for the first time on traffic flowing on the device.

Requirements

Before you begin, install or verify an IDP feature license.

This example uses the following hardware and software components:

  • An SRX Series Firewall.

  • Junos OS Release 18.3R1 and later.

Note:

This configuration example was tested using an SRX1500 device running Junos OS Release 18.3R1. However, you can use the same configuration on SRX300 line, SRX550M, SRX4100, SRX4200, and SRX5000 line devices using the latest releases of Junos OS.

Overview

In this example, you configure two security policies to enable IDP services on an SRX1500 device to inspect all traffic from the trust zone to the untrust zone.

As a first step, you must download and install the signature database from the Juniper Networks website. Next, download and install the predefined IDP policy templates and activate the predefined policy “Recommended” as the active policy.

In SRX 18.2 below version, only one IDP policy name can be used for all firewall rules and active-policy works in all security director versions.

As of Junos SRX 18.2, the traditional policy style of using only one active IDP policy name for all firewall rules via set security idp active-policy has been deprecated.

Instead the configuration style uses the same for Traditional Policies as that of Unified policies by referring to IDP policy is handled in the security policies set security policies from-zone <zone-name> to-zone <zone-name> policy <policy-name> then permit application-services idp-policy idp-policy-name command.

Next, you must create two security policies from the trust zone to the untrust zone and specify actions to be taken on the traffic that matches the conditions specified in the policies.

Configuration

Procedure

CLI Quick Configuration

CLI quick configuration is not available for this example, because manual intervention is required during the configuration.

Step-by-Step Procedure
  1. Create two security policies for the traffic from the trust zone to the untrust zone.

    Note:

    Please note the following points:

    • The order of the security policies on the SRX Series Firewall is important because Junos OS performs a policy lookup starting from the top of the list, and when the device finds a match for the traffic received, it stops policy lookup.

    • The SRX Series Firewall allows you to enable IDP processing on a security policy on a rule-by-rule basis, instead of turning on IDP inspection across the device.

    • A security policy identifies what traffic is to be sent to the IDP engine, and then the IDP engine applies inspection based on the contents of that traffic. Traffic that matches a security policy in which IDP is not enabled completely bypasses IDP processing. Traffic that matches a security policy marked for IDP processing enables the IDP policy that is configured in that particular security policy.

    Create a security policy P1 with a dynamic application as the match criteria.

    Create a security policy P2 with a dynamic application as the match criteria.

  2. Define the IDP policies that you want to configure in security policies.

  3. Configure the IDP policies as per steps in IDP Policy Rules and IDP Rule Bases, then configure one of the IDP policies (Recommended) as the default IDP policy.

  4. Confirm the default policy configured on your device.

  5. Specify the action to be taken on traffic that matches conditions specified in the security policy. The security policy action must be to permit the flow.

In SRX 18.3 versions and above, security policies may use different a different IDP policy allowing unique IDP rules processing for each security-policy. When multiple IDP rules are used on security policies an IDP default-policy is required to be configured.

Results

From configuration mode, confirm your configuration by entering the show security policies command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.

If you are done configuring the device, enter commit from configuration mode.

Verification

Verifying the IDP Configuration

Purpose

Verify that the IDP configuration is working properly.

Action

From operational mode, enter the show security idp status command.

Meaning

The sample output shows the Recommended predefined IDP policy as the active policy.

Example: Enabling IDP in a Traditional Security Policy

As of Junos SRX 18.2, the traditional policy style of using only one active IDP policy name for all firewall rules via set security idp active-policy has been deprecated.

Instead the configuration style uses the same for Traditional Policies as that of Unified policies by referring to IDP policy is handled in the security policies set security policies from-zone <zone-name> to-zone <zone-name> policy <policy-name> then permit application-services idp-policy idp-policy-name command.

This example shows how to configure two security policies to enable IDP services on all HTTP and HTTPS traffic flowing in both directions on a security device. This type of configuration can be used to monitor traffic to and from a secure area of an internal network as an added security measure for confidential communications.

Note:

In this example, Zone2 is part of the internal network.

Requirements

Before you begin:

Overview

For transit traffic to pass through IDP inspection, you configure a security policy and enable IDP application services on all traffic that you want to inspect. Security policies contain rules defining the types of traffic permitted on the network and the way that the traffic is treated inside the network. Enabling IDP in a security policy directs traffic that matches the specified criteria to be checked against the IDP rulebases.

Note:

IDP is enabled by default. No license is required. Custom attacks and custom attack groups in IDP policies can be configured and installed even when a valid license and signature database are not installed on the device.

To allow transit traffic to pass through without IDP inspection, specify a permit action for the rule without enabling the IDP application services. Traffic matching the conditions in this rule passes through the device without IDP inspection.

This example shows how to configure two policies, idp-app-policy-1 and idp-app-policy-2, to enable IDP services on all HTTP and HTTPS traffic flowing in both directions on the device. The idp-app-policy-1 policy directs all HTTP and HTTPS traffic flowing from previously configured Zone1 to Zone2 to be checked against IDP rulebases. The idp-app-policy-2 policy directs all HTTP and HTTPS traffic flowing from Zone2 to Zone1 to be checked against IDP rulebases.

Note:

The action set in the security policy action must be permit. You cannot enable IDP for traffic that the device denies or rejects.

If you have configured a traditional security policy (with 5-tuples matching condition or dynamic application configured as none) and an unified policy (with 6-tuple matching condition), the traditional security policy matches the traffic first, prior to the unified policy.

When you configure a unified policy with a dynamic application as one of the matching condition, the configuration eliminates the additional steps of configuring, source and destination address, source destination except, from and to zones, or application. All the IDP policy configurations are handled within the unified security policy and simplifies the task of configuring IDP policy to detect any attack or intrusions for a given session. Configuring source or destination address, source and destination-except, from and to zone, or application is not required with unified policy, as the match happens in the security policy itself.

Configuration

Procedure

CLI Quick Configuration

To quickly configure this example, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode.

Step-by-Step Procedure

The following example requires you to navigate various levels in the configuration hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration Mode in the CLI User Guide.

To enable IDP services on all HTTP and HTTPS traffic flowing in both directions on the device:

  1. Create a security policy for traffic flowing from Zone1 to Zone2 that has been identified as junos-http or junos-https application traffic.

  2. Specify the action to be taken on Zone1 to Zone2 traffic that matches conditions specified in the policy.

  3. Create another security policy for traffic flowing in the opposite direction that has been identified as junos-http or junos-https application traffic.

  4. Specify the action to be taken on traffic that matches the conditions specified in this policy.

  5. Configure the active-policy.

Results

From configuration mode, confirm your configuration by entering the show security policies command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.

If you are done configuring the device, enter commit from configuration mode.

Verification

To confirm that the configuration is working properly, perform this task:

Verifying the Configuration

Purpose

Verify that the security policy configuration is correct.

Action

From operational mode, enter the show security policies command.

Verifying the IDP Policy Compilation and Load Status

Purpose

Display the IDP log files to verify the IDP policy load and compilation status. When activating an IDP policy, you can view the IDP logs and verify if the policy is loaded and compiled successfully.

Action

To track the load and compilation progress of an IDP policy, configure either one or both of the following in the CLI:

  • You can configure a log file, which will be located in /var/log/, and set trace option flags to record these operations:

  • You can configure your device to log system log messages to a file in the /var/log directory:

After committing the configuration in the CLI, enter either of the following commands from the shell prompt in the UNIX-level shell:

Sample Output

command-name

Sample Output

command-name

Meaning

Displays log messages showing the procedures that run in the background after you commit the set security idp active-policy command. This sample output shows that the policy compilation, sensor configuration, and policy load are successful.