User manual JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGER APPLICATION CONFIGURATION GUIDE REV 1

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGER. We hope that this JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGER user guide will be useful to you.

Lastmanuals help download the user guide JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGER.


Mode d'emploi JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGER
Download

You may also download the following manuals related to this product:

   JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGER SOFTWARE INSTALLATION REV 1 (320 ko)
   JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGER LOG MANAGEMENT INSTALLATION REV 1 (462 ko)

Manual abstract: user guide JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGERAPPLICATION CONFIGURATION GUIDE REV 1

Detailed instructions for use are in the User's Guide.

[. . . ] The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not installed in accordance with NetScreen's installation instructions, it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. [. . . ] You can specify multiple mappings (each on a seperate line) for the same application. You can specify a wildcard character * for any of the fields. The wildcard character must be used alone and not part of a comma separated list. The wildcard character indicates that this field applies to all flows. STRM Default Application Configuration Guide Defining Application Mappings 3 · Since it is possible for a flow to be associated with multiple mappings, a flow is mapped to an application ID based on the order of the file. The first mapping that applies in the file is assigned to the flow. When adding new application identification numbers, we recommend that you apply numbers ranging between 15, 000 to 20, 000. Contact Juniper Networks Customer Support for further information. · The format of the entry must resemble the following: <New ID> <Old ID> <Source IP Address>:<Source Port> <Dest IP Address>:<Dest Port> <Name> Where: · <New ID> specifies the application ID you wish to assign to the flow. A value of 1 indicates an unknown application. If the ID you wish to assign does not exist, you must create the ID using the Application View in the STRM interface. For more information, see the STRM Administration Guide. · <Old ID> specifies the default application ID of the flow, as assigned by STRM. For more information on the default values, see Chapter 2 Default Applications. <Source IP Address> specifies the source IP address of the flow. This field may contain either a comma separated list of addresses or CIDR values. A value of * indicates a wildcard, which means that this field applies to all flows. <Source Port> specifies the associated port. This field may contain a comma · · separated list of values or ranges specifies in the format: <lower port number>-<upper port number>. A value of * indicates a wildcard, which means that this field applies to all flows. · <Dest IP Address> specifies the destination IP address of the flow. This field may contain either a comma separated list of addresses or CIDR values. A value of * indicates a wildcard, which means that this field applies to all flows. <Dest Port> specifies the associated destination source port. This field may contain a comma separated list of values or ranges specifies in the format: <lower port number>-<upper port number>. A value of * indicates a wildcard, which means that this field applies to all flows. [. . . ] ARP traffic. STRM Default Application Configuration Guide 18 DEFAULT APPLICATIONS Table 2-1 Default Applications (continued) Application View Group Sub-Component RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols RoutingProtocols AURP BGP BPDU Banyan-VINES CBT CiscoOUI DRP DTP EGP EIGRP GatewayRouting IDP IGMP IGP IanaProtocol-IP OSPF PAgP PIM PVSTP RARP RIP SpanningTree VLAN-Bridge VTP Value 60011 60029 34821 34838 60045 34823 60038 60192 60032 60065 34836 34825 60041 60098 34835 60031 60190 60044 60189 60047 60028 60046 60191 60193 60061 60033 60172 60037 60080 60026 60036 60067 60079 60171 60186 Description AURP traffic. SoftEther traffic. SecurityProtocols DPA SecurityProtocols GRE SecurityProtocols IPMobility SecurityProtocols IPSec SecurityProtocols ISAKMP SecurityProtocols L2TP SecurityProtocols PPTP SecurityProtocols RC5DES SecurityProtocols SOCKS SecurityProtocols SWIPE SecurityProtocols SoftEther STRM Default Application Configuration Guide 19 Table 2-1 Default Applications (continued) Application View Group Sub-Component Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Streaming Uncommon Protocol Uncommon Protocol Unknown_apps VoIP VoIP VoIP VoIP VoIP VoIP VoIP VoIP VoIP VoIP Abacast H. 261 H. 262 H. 263 MPEG-Audio MPEG-Video MicrosoftMediaServer Motion RTP-Skinny RTSP RadioNetscape Real ST2 StreamWorks StreamingAudio StreamingAudio WinMedia WinampStream WindowsMediaPlayer WindowsMediaPlayer DEC UncommonProtocol Unknown CiscoCTI Clarent-CC Clarent-Complex Clarent-Mgmt Clarent-Voice-S Dialpad G711 G722 G729 H. 323 Value 60174 34829 34828 34827 60053 60054 4002 60185 34834 5071 60180 60003 60034 60014 4000 4001 60025 60165 5005 5006 34824 34850 1 60144 60075 60074 60072 60073 60140 34833 34832 34831 60018 Description Abacast traffic. Streaming Microsoft Media Server Protocol (MMS) Motion traffic. Shoutcast MP3 stream Shoutcast MP3 stream WinMedia traffic. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGER

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual JUNIPER NETWORKS SECURITY THREAT RESPONSE MANAGER will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag