ImageVerifierCode 换一换
格式:DOCX , 页数:14 ,大小:23.21KB ,
资源ID:3974223      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/3974223.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(IDP导入license以及配置.docx)为本站会员(b****5)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

IDP导入license以及配置.docx

1、IDP导入license以及配置SRX Getting Started - Quick Setup Guide for Configuring IDP on a SRX or J-Series deviceSUMMARY:This article describes the steps involved in configuring IDP on a SRX device.For other topics, go to theSRX Getting Startedmain page.SOLUTION:The basic configuration of IDP involves the fol

2、lowing four tasks:I. Install IDP licenseThe IDP signature update is a subscription service requiring a license. In order to download and use the predefined attack signatures in a policy, the IDP license must be installed. If you are using only custom signatures, you do not need an IDP license.1. Fir

3、st, activate your subscription license by entering the authorization code and chassis serial number into theSubscription Registrationsystem. Refer toKB9731for more information. If you still need help, please contactCustomer Carefor subscription and licensing issues.2. Then, install the license on th

4、e SRX in one of two ways - automatically or manually:a. Automatically:Confirm the SRX device has connectivity to the Internet.Then run the following command:root request system license updateORb. Manually:Licenses can also be loaded manually via JWeb, NSM, or using the CLI. The CLI command is as fol

5、lows:root request system license add terminalType D at a new line to end input,enter blank line between each license keyPaste the license key and press enterType Ctrl+DThe License key should be added successfully.3. Verify the license is installed using the command:root show system licenseCheck for

6、feature idp-sig.NOTE: If running a Chassis Cluster, then the IDP license needs to be installed on both nodes.II. Download and install the Signature DatabaseAfter the IDP license is installed, the IDP Signature Database can be downloaded and installed by performing the following steps:1. Confirm the

7、device has the necessary configuration for connectivity to the Internet.2. Configure the signature database URL:root editset security idp security-package url root#commit3. Check the version of the signature database in the sigdb server. Look for Successfully retrieved . In this example, the version

8、 in the server is 1577.root request security idp security-package download check-serverSuccessfully retrievedfrom(Version info:1577(Detector=10.2.160091104, Templates=2)4. Download the signature database:root request security idp security-package download full-update5. Verify the progress of the dow

9、nload:root request security idp security-package download statusroot request security idp security-package download statusIn progress:downloading file .platforms.xml.gzroot request security idp security-package download statusDone;Successfully downloadedfrom(Version info:1586(Tue Jan 19 12:28:29 201

10、0, Detector=10.2.160091104)Important: When Successfully downloaded is reported, proceed to the next step. If it is not successfully downloaded, the install will fail.6. Install the signature DB by running the command:root request security idp security-package installadmin request security idp securi

11、ty-package install policy-templates This command loads the security package into the IDPD embedded DB. If there is an existing running policy it re-compiles the existing running policy and pushes the compiled policy to the data plane. Therefore, the install might take a while depending on the platfo

12、rm and the size of the policy. Lower end Branch platforms might take a longer time for install.7. Monitor the status of the install with the command:root request security idp security-package install statusDone;Attack DB update : successful - UpdateNumber=1581,ExportDate=Tue Jan 12 12:43:22 2010,Det

13、ector=10.2.160091104Updating control-plane with new detector : successfulUpdating data-plane with new attack or detector : successfulThe UpdateNumber field shows the version updated, the date when the signature db was released, and the detector version8. Verify the version of the sigdb installed:roo

14、t oAttack database version:1577(Tue Jan 5 13:27:18 2010)Detector version :10.2.160091104Policy template version :2Tips: Refer toKB16491for instructions on how to schedule the signature database download for automatic updates.CLI Configuration1. Specify the URL for the security package:root# set secu

15、rity idp security-package url IMPORTANT: The URL stated above is correct. The URL, i.e. http:/sec-, specified in the some versions of the documentation is not correct. Please use the URL above.2. Specify the time and interval for the automatic download:root# set security idp security-package automat

16、ic interval start-time For example, to set the download to happen after three days, with the first automatic downloading starting on 14th July at 2:00 AM:root# set security idp security-package automatic interval 72 start-time 2013-07-14.02:00:003. Enable the automatic download:root# set security id

17、p security-package automatic enableNOTES:If you have configured the device for automatic signature DB download, the new signature database is downloaded and installed.If there is arunning IDP policy in the device, the policy is recompiled with the new signatures and pushed to the data plane.Similarl

18、y, if there is an existing running IDP policy and the previously installed detectors version is different from the newly downloaded one, then the newly downloaded detector is pushed to the data plane. Refer toTN83for instructions on how to perform offline sigdb download. For additional information o

19、n the IDP Signature Database, refer to the Security Configuration Guide - IDP Signature Database Chapter:III. Configure Recommended Policy as the IDP PolicyJuniper Networks provides predefined policy templates that can be used as a starting point for creating your own IDP policies. For getting start

20、ed, it is recommended to use the predefined policy named Recommended:1. Load the predefined templates, and select the Recommended template as the Active IDP policy. Refer toKB16490for step by step instructions.CLI ConfigurationDownload the latest IDP policy templates (such as Recommended, All with L

21、ogging) from the Juniper Website using the following command:root request security idp security-package download policy-templatesThe policy-templates are downloaded to the directory:/var/db/idpd/sec-download/sub-downloadCheck the status of the download with the command:root request security idp secu

22、rity-package download statusDone;Successfully downloaded from(Version info:2Install the template file:root request security idp security-package install policy-templatesIt will be installed into:/var/db/scripts/commit/templates.xslCheck the status of the install with the command:rootSRX210-HM reques

23、t security idp security-package install statusDone;policy-templates has been successfully updated into internal repository(=/var/db/scripts/commit/templates.xsl)!Apply the template into the Junos config, and then commit!root configureroot# set system scripts commit file templates.xslroot# commitcomm

24、it之后要把源文件删除delete system scripts commit file templates.xslOnce committed, the predefined templates can be used. Enter the following command to see the possible templates. You can set one of the predefined templates as the active policy, and also make changes to the policy.root# set security idp acti

25、ve-policy ?Possible completions: Set active policyDMZ_ServicesDNS_ServiceFile_ServerGetting_StartedIDP_DefaultRecommendedWeb_ServerFor example, to make Recommended template as the active IDP policy use the command:root# set security idp active-policy Recommendedroot# commit2. Verify that the Active

26、IDP Policy is Recommended. The Policy Name in the output below refers to the Active IDP Policy.root show security idp statusSession Statistics:ICMP: 0 TCP: 0 UDP: 0 Other: 0 Policy Name : Recommended v0Running Detector Version : 10.2.1600911043. Perform the instructions below in the next section: IV

27、. Enable a Security Policy for IDP inspection.Tips: For additional information on configuring IDP policies, refer to the Security Configuration Guide - IDP Policies Chapter: Refer toKB15374on how to verify if the IDP Policy was compiled and loaded successfully to the dataplane.IV. Enable a Security

28、Policy for IDP inspectionOnce the IDP Policy is configured, IDP needs to be enabled on a security policy so that IDP inspection is performed. This is done by permitting application-services while configuring a security policy.For example, the following commandforwards all traffic from-zone trust to-

29、zoneuntrust to IDP to bechecked against the IDP rulebase: root# set security policies from-zone trust to-zone untrust policy idp-app-policy-1 match source-address any destination-address any application anyroot# set security policies from-zonetrust to-zoneuntrust policy idp-app-policy-1 then permit application-services idpTips: For additional information on enabling IDP in a Security Policy, refer to theSecurity Configuration Guide - Enabling IDP in a Security Policy:

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1