Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are
owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312,
6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE.
BY DOWNLOADING, INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS
CONTAINED HEREIN, YOU (AS CUSTOMER OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO
BIND THE CUSTOMER)CONSENT TO BE BOUNDBY THIS AGREEMENT.IF YOUDO NOTOR CANNOT AGREE TO THE TERMS CONTAINED
HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS
REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or
Juniper Networks (Cayman) Limited (ifthe Customer’sprincipal officeis located outsidethe Americas) (such applicable entitybeing referred
to herein as“Juniper”),and (ii) the person or organization thatoriginally purchased from Juniperor an authorized Juniperreseller the applicable
license(s) for use of the Software (“Customer”) (collectively, the “Parties”).
2. The Software. In this Agreement, “Software” means the program modules and features of the Juniper or Juniper-supplied software, for
which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller, or which was embedded by
Juniper in equipment which Customer purchased from Juniper or an authorized Juniper reseller. “Software” also includes updates, upgrades
and new releases of such software. “Embedded Software” means Software which Juniper has embedded in or loaded onto the Juniper
equipment and any updates, upgrades, additions or replacements which are subsequently embedded in or loaded onto the equipment.
3. License Grant. Subject topayment ofthe applicablefees andthe limitationsand restrictionsset forth herein, Juniper grants toCustomer
a non-exclusive and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the
following use restrictions:
a. Customer shall use Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by
Customer from Juniper or an authorized Juniper reseller.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units
for which Customer has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access
Client software only, Customer shall use such Software on a single computer containing a single physical random access memory space
and containing any number of processors. Use of the Steel-Belted Radius or IMS AAA software on multiple computers or virtual machines
(e.g., Solaris zones) requires multiple licenses, regardless of whether such computers or virtualizations are physically contained on a single
chassis.
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may
specify limitsto Customer’s useof the Software. Suchlimits may restrictuse to amaximum numberof seats, registered endpoints, concurrent
users, sessions, calls, connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of
separate licenses to use particular features, functionalities, services, applications, operations, or capabilities, or provide throughput,
performance, configuration, bandwidth, interface, processing, temporal, or geographical limits. In addition, such limits may restrict the use
of the Software to managing certain kinds of networks or require the Software to be used only in conjunction with other specific Software.
Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable licenses.
d. For any trial copy of the Software, Customer’s right to use the Software expires 30 days after download, installation or use of the
Software. Customer may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not
extend or create an additional trial period by re-installing the Software after the 30-day trial period.
e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer’s
enterprise network. Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the
Steel-Belted Radius software to support any commercial network access services.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase
the applicable license(s) for the Software from Juniper or an authorized Juniper reseller.
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees
not to and shall not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized
copies of the Software (except as necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the
Software,in any form, toany thirdparty; (d)remove any proprietarynotices, labels,or marks on orin any copy of the Softwareor any product
in which the Software is embedded; (e) distribute any copy of the Software to any third party, including as may be embedded in Juniper
equipment sold inthe secondhand market; (f)use any ‘locked’ orkey-restricted feature,function, service, application, operation, orcapability
without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even if such feature, function, service, application,
operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper to any third party; (h) use the
Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper reseller; (i)
use Embedded Software on non-Juniper equipment; (j) use Embedded Software (or make it available for use) on Juniper equipment that
the Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking
of the Software to any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly
provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper,
Customer shall furnish such records to Juniper and certify its compliance with this Agreement.
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper.
As such, Customer shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence,
which at a minimum includes restricting access to the Software to Customer employees and contractors having a need to use the Software
for Customer’s internal business purposes.
7. Ownership. Juniper and Juniper’s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to
the Software, associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance
of any right, title, or interest in the Software or associated documentation, or a sale of the Software, associated documentation, or copies
of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty
statementthat accompaniesthe Software (the“Warranty Statement”).Nothing inthis Agreement shallgive riseto any obligation to support
the Software. Support services may be purchased separately. Any such support shall be governed by a separate, written support services
agreement. TO THE MAXIMUM EXTENT PERMITTED BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA,
OR COSTSOR PROCUREMENTOF SUBSTITUTEGOODS ORSERVICES,OR FOR ANY SPECIAL,INDIRECT,OR CONSEQUENTIALDAMAGES
ARISING OUTOF THIS AGREEMENT,THE SOFTWARE,OR ANY JUNIPEROR JUNIPER-SUPPLIEDSOFTWARE. INNO EVENT SHALLJUNIPER
BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE.
EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW, JUNIPER DISCLAIMS ANY
AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES
JUNIPER WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT
ERROR OR INTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper’s or its suppliers’
or licensors’ liability to Customer, whether in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid
by Customer for the Software that gave rise to the claim, or if the Software is embedded in another Juniper product, the price paid by
Customer for such other product. Customer acknowledges and agrees that Juniper has set its prices and entered into this Agreement in
reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same reflect an allocation of risk between
the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss), and that the same
form an essential basis of the bargain between the Parties.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination
of the license granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related
documentation in Customer’s possession or control.
10. Taxes. All license fees payable under this agreement are exclusive of tax. Customer shall be responsible for paying Taxes arising from
the purchase of the license, or importation or use of the Software. If applicable, valid exemption documentation for each taxing jurisdiction
shall be provided to Juniper prior to invoicing, and Customer shall promptly notify Juniper if their exemption is revoked or modified. All
payments made by Customer shall be net of any applicable withholding tax. Customer will provide reasonable assistance to Juniper in
connection with such withholding taxes by promptly: providing Juniper with valid tax receipts and other required documentation showing
Customer’s payment of any withholding taxes; completing appropriate applications that would reduce the amount of withholding tax to
be paid; and notifying and assisting Juniper in any audit or tax proceeding related to transactions hereunder. Customer shall comply with
all applicable tax laws and regulations, and Customer will promptly pay or reimburse Juniper for all costs and damages related to any
liability incurred by Juniper as a result of Customer’s non-compliance or delay with its responsibilities herein. Customer’s obligations under
this Section shall survive termination or expiration of this Agreement.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any
applicable foreign agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such
restrictions, laws or regulations, or without all necessary approvals. Customer shall be liable for any such violations. The version of the
Software supplied to Customer may contain encryption or other capabilities restricting Customer’s ability to export the Software without
an export license.
12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use,
duplication, or disclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS
227.7201 through 227.7202-4, FAR 12.212, FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer
with the interface information needed to achieve interoperability between the Software and another independently created program, on
payment of applicable fee, if any. Customer shall observe strict obligations of confidentiality with respect to such information and shall use
such information in compliance with any applicable terms and conditions upon which Juniper makes such information available.
14. Third Party Software. Any licensor ofJuniper whose software is embedded in the Software and any supplier of Juniper whose products
or technology are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement,
and such licensor or vendor shall have the right to enforce this Agreement in itsown name asif it were Juniper. In addition, certain third party
software may be provided with the Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent
portions of the Software are distributed under and subject to open source licenses obligating Juniper to make the source code for such
portions publicly available (such as the GNU General Public License (“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper
will make such source code portions (including Juniper modifications, as appropriate) available upon request for a period of up to three
years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N. Mathilda Ave., Sunnyvale, CA
94089, ATTN: General Counsel. You may obtain a copy of the GPL at http://www.gnu.org/licenses/gpl.html, and a copy of the LGPL
at http://www.gnu.org/licenses/lgpl.html .
15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws
principles. The provisions of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes
arising under this Agreement, the Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal
courts within Santa Clara County, California. This Agreement constitutes the entire and sole agreement between Juniper and the Customer
with respect to the Software, and supersedes all prior and contemporaneous agreements relating to the Software, whether oral or written
(including any inconsistent terms contained in a purchase order), except that the terms of a separate written agreement executed by an
authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict with terms contained
herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in writing
by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity
of the remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the
Parties agree that the English version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de
même que tous les documents y compris tout avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that
this Agreement and all related documentation is and will be in the English language)).
This preface provides the following guidelines for using the NSM API Guide and related
Juniper Networks, Inc. technical documents:
•
Objectives on page xv
•
Audience on page xv
•
Conventions on page xv
•
Documentation on page xvii
•
Requesting Technical Support on page xvii
Objectives
This guide explains how to use the Network and Security Manager (NSM) API to manage
device configurations and control communications between the API, externalweb clients,
and the internal NSM GUI client.
Audience
This guide is written for developersand network administrators whoconfigure and monitor
Juniper Networks DMI and non-DMI compliant device routing platforms.
Conventions
•
Customers with technical knowledge of networks and the Internet.
•
Network administratorswho install, configure, andmanage Juniper Networksproducts.
Familiarity with the XML language is needed.
The sample screens used throughout this guide are representations of the screens that
appear when you install and configure the NSM software. The actual screens may differ.
All examples show default file paths. If you do not accept the installation defaults, your
paths will vary from the examples.
Table 1 on page xvi defines text conventions used in this guide.
Table 3 on page xvii describes documentation for the NSM.
Table 3: Network and Security Manager Publications
DescriptionBook
Network and Security
Manager Installation Guide
Network and Security
Manager Administration
Guide
Network and Security
Manager Configuring Screen
OS and IDP Devices Guide
Network and Security
Manager Online Help
Describes the steps to install the NSM management system on a
single server or on separate servers. It also includes information on
how to install and run the NSMuser interface.This guideis intended
for IT administrators responsible for the installation or upgrade of
NSM.
Describes how to use and configure key management features in
the NSM. Itprovides conceptual information, suggested workflows,
and examples. This guide is best used in conjunction with the NSM
Online Help,which provides step-by-step instructions for performing
management tasks in the NSM UI.
This guide is intended for application administrators or those
individuals responsible for owning the server and security
infrastructure and configuring the product for multi-user systems.
It is also intended for device configuration administrators, firewall
and VPN administrators, and network security operation center
administrators.
Describes NSM features related to device configuration and
management. It also explains how to configure basic andadvanced
NSM functionality, including deploying new device configurations,
managing security policies and VPNs, and general device
administration.
Provides procedures for basic tasks in the NSM user interface. It
also includes a brief overview of the NSM system and a description
of the GUI elements.
Network and Security
Manager API Guide
Network and Security
Manager Release Notes
Requesting Technical Support
Technical productsupport is availablethrough theJuniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need postsales technical support, you can access
our tools and resources online or open a case with JTAC.
Provides complete syntax and description of the SOAP messaging
interface to NSM.
Provides the latest information about features, changes, known
problems, resolved problems, and system maximum values. If the
information in the Release Notesdiffers from the information found
in the documentation set, follow the Release Notes.
Release notes are included on the corresponding software CD and
are available on the Juniper Networks Website.
JTAC Hours of Operation —The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
Self-Help Online Tools and Resources
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
•
Download the latest versions of software and review release notes:
http://www.juniper.net/customers/csc/software/
•
Search technical bulletins for relevant hardware and software notifications:
https://www.juniper.net/alerts/
•
Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
•
Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/
To verifyservice entitlement byproduct serial number,use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
•
Use the Case Management tool in the CSC at http://www.juniper.net/cm/ .
•
Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
For international or direct-dial options in countries without toll-free numbers, visit us at
This part introducesthe Network and Security Manager(NSM) Application Programming
Interface (API) with a brief overview, summary of the required client environment, list of
the component APIs, and examples.
This section provides general information about the Network and Security Manager
(NSM) API.
•
NSM API Features on page 3
•
NSM API Authentication and Authorization on page 4
•
NSM API Error Handling on page 4
The NSM API provides programmatic access to NSM and enables third-party developers
to create applications that leverage the power of NSM. The API supports Simple Object
Access Protocol/Hypertext Transmission Protocol Secure (SOAP/HTTPS). The SOAP
API is built on open standards such as SOAP and the Web Service Definition Language
(WSDL) supported by a range of development tools. You can use a third-party SOAP
development tool to generate programming language objects and stubs from the WSDL
that specifies the message schema. Your application works with data in the format of
generated objects; it sends and receives the data by invoking the methods of stubs.
The API provides a rich set of data models for devices and security policies. The models
are published in the format of XML schema (XSD).
In this release, the NSM API provides the following features and functions:
The CommonDataTypes.xsd file contains definitions of the data types described in this
chapter.
For more information, see the NSM Release Notes, NSM Administration Guide, and NSMOnline Help for client and server setup requirements.
This chapter contains the following sections:
NSM API Authentication and Authorization
Before the API can connect to the NSM server, a user must log into the NSM server using
a user name, password, and domain name. This is analogous to the user sign in a regular
GUI client. The application includes the authentication token in the subsequent API call
requests to the NSM server.
NSM API Error Handling
If the API client encounters an error,either the client receives an error message or an
exception is thrown. Two types of errors are possible.
•
Application-level errors result from problems with application-level data on the client
side or on the server side.
•
The request is missing a required field. In this case, the request is not sent out from
the client side.
•
The request is valid, but a problem occurred when NSM processed the data.
•
Infrastructure errors can occur on the client side or server side. The NSM
application-level software does not catch this type of error, so exceptions are thrown
by the API client code. The possible errors are:
•
NSM server is down
•
Problem with the client-side or server-side SOAP framework
•
Wrong server address
The NSM server catches all application-level errors and returns the error messages.
The result of a service request is either Success or Failure If a request fails, an error code
and error message are returned as part of the response message.
Figure 1 on page 5 shows the basic structure of application-level errors returned by the
NSM server. Table 4 on page 5 describes the frequently used ErrorType data type.
These request errors (not infrastructure errors) are issued when the system encounters business data
problems (for example, an invalid combination of arguments). This complexType data has the following
sequence:
•
ErrorNumber = Unique number that identifies the particular error condition (type = unsignedInt). This
data element is only used by the server.
•
ErrorMessage = Brief description of the condition that raised the error (type = string).
•
ErrorActor = The source (location) of the error (type = string).
The application programminginterface(API) defined byNSM isused toprovision policies,
manage and monitor devices, and generate reports. The API has four parts:
•
System Service API on page 7
•
Data Centric Service API on page 8
•
Job Service API on page 11
•
Log Service API on page 13
System Service API
The API System Service processes log in, log out, and system information requests.Table
5 on page 7 summarizes the API data elements.
For information about the WSDL file defining the API, see “System Service API WSDL”
on page 129 .
Table 5: System Service API Operations
DescriptionOperation
LoginRequest
Log into NSM server.
Request:
•
domainName = Domain supplied during login. The user logs in to this domain.
NOTE: Use global.<subdomain name> to log in to a subdomain and global to log in to
a global domain.
•
userName = User name supplied during login.
•
password = Password supplied during login.
Response:
•
loginStatus = Uses LoginStatusCodeType to return:
“Success” if the login is successful.
“Failure” for login rejection.
“Challenge” if the login request is being challenged but not yet denied.
•
authToken =Token returned for login request success. This token is reused for other
requests during the current session.
Table 5: System Service API Operations (continued)
RespondToChallengeRequest
LogoutRequest
GetSystemInfoRequest
Data Centric Service API
Reuses the token received in LoginResponse to send a response to the challenge.
Receives a token if the response is successful.
Request: Answer to the challenge question.
Response: Token received.
Logout from the system.
Request: none
Response: none
This operation retrieves system information (service list and all accessible domain IDs
and names).
Request: serviceName
Response: serviceDesc, domain name and domain ID.
NOTE: When using the LoginRequest API, enter global.<subdomain name>
to log in to a particular subdomain. The login fails if just the subdomain name
is used.
The Data Centric Service API provides access to the internal data of NSM. It receives
incoming data access requests, retrieves the data from NSM, conducts any necessary
transformations, and sends the transformed data back as responses. This section
introduces the XML subtree filter used with the service and describes the Data Centric
data elements.
NOTE: In the current release of NSM, write accessto the deviceobj and sysvpn
from the Data Centric Service is blocked to protect data integrity.
See “Data Centric API WSDL”on page 135 for a description of the API-definingWSDL file.
Data Centric Service XML Subtree Filter
The filter used in the Data Centric Service API is the XML subtree filter defined by
NETCONF. Subtree filtering is a mechanism that allows an application to select particular
XML subtrees from the configurations from the devices.
A subtree filter consists of zero or more element subtrees, which represent the filter
selection criteria.
Five types of components may be present in a subtree filter:
Modifies the object. All commands in the request are executed in one
transaction. ModifyObjectViewRequest supports the following operations:
•
Update Node
•
Insert node before / after
•
Append node
•
Insert Object
•
Replace Object
•
Delete Object
NOTE: You should lockthe object before modifying itand unlock it afterwards.
The modification will fail if the object is locked by a different user session.
However, a modification request without prior locking can run if the object is
not locked by the others. Data corruption does not occur even if an API user
forgets to lock an object before modifying it.
Request:
•
command =Command that modifiesthe object (type = ModifyCommand).
A data object is data that is identifiable by the NSM API. NSM data objects are logically
grouped by domains and categories. A domain is a logical grouping of devices, their
security policies, and their access privileges. A category is a logical grouping of the data
objects that have the same structure. For example, a deviceobj is a category of data
objects for devices.
Each object in a category is identified by a tuple (domain, category, object id). The XML
representation of the data objects conforms to the XML schemas illustrated later in this
chapter.
Objects are referenced by name or ID.
•
Reference based on id. The reference to an object is defined in the following format
&<domain id>.<category name>.<object id>. For example, &1.service.100.
•
Reference based on name. The reference to an object defined in the following format
&<domain id>.<category name>.?????????<object name>. Here, nine question marks
precede <object name>.
The key data types are illustrated in Figure 2 on page 18. The entire set of common data
types is described in Table 9 on page 18.
This chapter describes the message types, SimpleRequest and SimpleResponse, that
are most commonly used in API data messages.
•
SimpleRequestType and SimpleResponseType Data Types on page 21
SimpleRequestType and SimpleResponseType Data Types
The frequently used data types SimpleRequestType and SimpleResponseType are
illustrated in Figure 3 on page 21 and Figure 4 on page 21. They are described in Table
10 on page 22
Table 10: SimpleRequestType and SimpleResponseType Definitions
DescriptionData Type
SimpleRequestType
SimpleResponseType
Base type definition of the SOAP body of the request.All request types are derived from theabstract
type. The naming convention for concrete type names is the name of the service (verb or call name)
followed by “RequestType.” Generally, VerbNameRequestType.
This complexType data has the following sequence:
•
ConversationContext = Context of the message conversation (type = ConversationContextType).
•
AuthToken = Token returned for the simple request (type = AuthTokenType).
Base type definition of the SOAP body of a response. This complexType data has the following
sequence:
•
Status = Status of the response (type = StatusCodeType).
•
ConversationContext = Context of the message conversation (type = ConversationContextType).
This chapter introducesaspects of the APIdata modelthat apply to NSM security policies.
For complete details, see the dm.xsd and dm.xsd definition files included with the file set
in this release.
The adm.xsd is located at $NSROOT/GuiSvr/var/be/schemas/dmi-nsm/ . The smaller
zip file (adm.zip) is located at $NSROOT/GuiSvr/var/be/schemas/dmi-nsm/document.
This chapter contains the following sections:
•
NSM Policy on page 23
•
Security Rulebases on page 25
•
Service (service_collection) on page 54
•
Address (address_collection_type) on page 56
•
Schedule Object (scheduleobj_collection_type) on page 57
•
Attack (attack_collection) on page 58
•
Antivirus (avobj_collection) on page 62
•
GTP (gtpobj_collection_type) on page 64
•
DI Profile (DIProfile_collection_type) on page 67
•
Global DIP (globaldip_collection) on page 67
•
Global MIP (globalmpi_collection) on page 68
•
Global VIP (globalvip_collection) on page 69
•
URL Filter Object (urlfilter_collection) on page 70
NSM Policy
The NSM Policy collection (nsmpolicy_collection) data elements are illustrated and
described in Figure 5 on page 24 and Table 11 on page 24.
(Optional) Effective start date for the NSM security policy.createFrom
Collection of references of rulebases. For more information, see “Security Rulebases” on page 25.rulebases
Reference of the firewall rulebase. Firewall rule data elements are included in a security policy. For
more information, see “Firewall (rb_firewall_collection)” on page 33.
Reference of the multicast rulebase. Multicast rule data elements are included in a security policy.
For more information, see “Multicast (rb_multicast_collection)” on page 43.
Reference of the IDP rulebase, Idp rule data elements are included in a security policy. For more
information, see “IDP (rb_idp_collection)” on page 39.
Reference of the Exempt rulebase. Exempt rule data elements are included in a security policy. For
more information, see “Exempt (rb_exempt_collection)” on page 30.
Reference of the backdoor rulebase. Backdoor rule data elements are included in a security policy.
For more information, see “Backdoor (rb_backdoor_collection)” on page 25.
Network Honeypot (portfaker) rulebase. These data elements are included in a security policy. For
more information, see “Traffic Anomalies (rb_tsig_collection)” on page 48.
Reference of the SYN Protector rulebase, These data elements are included in a security policy. For
more information, see “SYN Protector (rb_syndef_collection)” on page 45.
Traffic Anomalies rulebase. These data elements are included in a security policy. For more
information, see “Traffic Anomalies (rb_tsig_collection)” on page 48.
NSM security policies are configured by applying rules that are grouped into rulebases.
Each rulebase can contain one or more rules, which are statements that define specific
types ofnetwork traffic. Whentraffic passes througha securitydevice, the deviceattempts
to match that traffic against its list of rules. If a rule is matched, the device performs the
action defined in the rule against the matching traffic. Zone rules enable traffic to flow
betweenzones (interzone) orbetweentwo interfacesbound tothe samezone (intrazone).
Global rules are valid across all zones available on the device. Security devices process
rules in the zone-specific rulebase first, and then rules in the global rulebase.
The NSM API data model supports the security policy rulebases summarized in the
following sections.
Backdoor (rb_backdoor_collection)
The backdoor rulebase collection (rb_backdoor_collection) contains rules that enable
NSM to detect attempted backdoor intrusions. A backdoor is a mechanism installed on
a host computer that enables unauthorized access to the system. Attackers who have
already compromised a system can install a backdoor to make future attacks easier.
When attackers type commands to control a backdoor, they generate interactive traffic.
Unlike antivirus software, which scans for known backdoor files or executables on the
host system, IDP detects the interactive traffic that is produced when backdoors are
used. If interactive traffic is detected, IDP can perform IP actions against the connection
to prevent the attacker from further compromising your network.
Table 12: Backdoor Rulebase Data Elements (continued)
DescriptionData Element
Rule number.ruleno
preferred-id
A rule ID is a number that uniquely identifies a rule within the
rulebase and security policy. After you install a rule as part of
a security policy on a security device, you can view the rule by
logging in locally to the device. However, when you view it
through the Web UI or CLI, the rule appears as an individual
policy. The individual policy on the device has the same ID as
the rule in themanagement system,enabling you to determine
which rules are on specific devices.
Comments about the backdoor rules.comments
Rule group name.rb-link
Custom options.customOptions_collection
Collection enabled.enabled
The source sends traffic from this zone.src_zone_collection
Address of the traffic source.src_addr_collection
Negates the specified source address.src_addr_negate
The source sends traffic to this zone.dst_zone_collection
Destination address for the traffic.dst_addr_collection
service
Negates the specified destination address.dst_addr_negate
These service object rules specify the service that an attack
uses to access the network.
Table 12: Backdoor Rulebase Data Elements (continued)
DescriptionData Element
Chapter 5: Security Data Model
action
op
log
For each attack that matches a rule, you can choose an action
that will occur if the IDP detects interactive traffic. The
following actions are possible:
•
Accept = IDP accepts the interactive traffic
•
Drop Connection = IDP drops the interactive connection
without sending an RST packet to the sender. This prevents
the traffic from reaching its destination. This action is
selected to drop connections from traffic that is not prone
to spoofing.
•
Close Client = IDP closes the interactive connection to the
client but not to the server.
•
Close Server = IDP closes the interactive connection to the
server but not to the client.
•
Close Client and Server = IDP closes the interactive
connection and sends a RST packet to both the client and
the server. If IDPis operating in an inline tap mode, IDP sends
a RST packet to both the client and the server but does not
close the connection.
Sets the operation to detect or ignore. If you select detect,
choose an action to perform if backdoor traffic is detected.
If this parameter is enabled, the API logs an attack and creates
log records with attack information. You can display this
information real time in the Log Viewer. For more critical
attacks, you can set an alert flag that will appear in the log
record.
vlan
log-actions
This parameter configures a rule that only appliesto messages
in specified VLANs. The possible settings are:
•
Any (default) = Any rule will be applied to messages in any
VLAN andto messages without a VLAN tag. This settinghas
the same effect as not specifying a VLAN. Any can be sent
to devices that do not support VLAN tagging.
•
None = A rule will be applied only to messages that do not
have a VLAN tag. Rules with this value set cannot be sent
to devices that do not support VLAN tagging.
•
vlan_list_collection = Specifies the VLAN tags to which the
rule applies. You must create VLAN objects before applying
them to the rules. Rules with this value set cannot be sent
to devices that do not support VLAN tagging.
Action to be taken on the log. This can include configuring
SNMP, Syslog, CSV, XML, script, and e-mail settings.
Table 12: Backdoor Rulebase Data Elements (continued)
severity
target_collection
Exempt (rb_exempt_collection)
The exempt (rb_exempt_collection) rulebase works in conjunction with the IDP rulebase.
Before you create exempt rules, you must create rules in the IDP rulebase. If traffic
matches a rule in the IDP rulebase, IDP attempts to match the traffic against the rules
in the exempt rulebase before performing the specified action or creating a log record
for the event. When the IDP rulebase is deleted, the exempt rulebase is automatically
deleted. When you create an exempt rule, you must specify the source and destination
traffic to be exempted and the specific attacks that IDP will exempt.
Severityof the attack. Within the IDP rulebase, you can override
the ordinary attack severity on a per-rule basis. Possible
settings:
•
Default
•
Info
•
Warning
•
Minor
•
Major
•
Critical
Log packets.seslog
Specifies the security devices or templates that will receive
and use this rule. You can select multiple security devices on
which to install the rule.
The data elements in the exempt rulebase are illustrated and described in Figure 7 on
page 31 and Table 13 on page 31.
Table 13: Exempt Rulebase Data Elements (continued)
DescriptionData Element
Rule number.ruleno
Comments about the exempt collection.comments
Custom options.customOptions_collection
Collection enabled.enabled
preferred-id
attacks
A rule ID is a number that uniquely identifies a rule within the rulebase and security policy.
After you install a rule as part of a security policy on a security device, you can view the rule
by logging in locally to the device. However, when you view it through the Web UI or CLI,
the rule appears as an individual policy. The individual policy on the device has the same
ID as the rule in the management system, enabling you to determine which rules are on
specific devices.
Rule group name.rb-link
The source sends traffic from this zone.src_zone_collection
Address of the traffic source.src_addr_collection
Negates the specified source address.src_addr_negate
The source sends traffic to this zone.dst_zone_collection
Destination address for the traffic.dst_addr_collection
Negates the specified destination address.dst_addr_negate
Exempt type service.service
The attacks that IDP will exempt for the specified source/destination address. You must
include at least one attach object in an exempt rule.
vlan
target_collection
This parameter configures a rule that only applies to messages in specified VLANs. The
possible settings are:
•
Any (default) = Any rule will be applied to messages in any VLAN and to messages
without a VLAN tag. This setting has the same effect as not specifying a VLAN. Any can
be sent to devices that do not support VLAN tagging.
•
None = A rule will be applied only to messages that do not have a VLAN tag. Rules with
this value set cannot be sent to devices that do not support VLAN tagging.
•
vlan_list_collection = Specifiesthe VLAN tags to which the rule applies. You must create
VLAN objects before applying them to the rules. Rules with this value set cannot be sent
to devices that do not support VLAN tagging.
Specifies thesecurity devices or templates that will receive and use this rule. You can select
multiple security devices on which to install the rule.
The firewall (rb_firewall_collection) rulebase contains zone-specific and global rules. A
security policy can contain two firewall rulebases: zone-specific and global.
The data elements in the firewall rulebase are illustrated and described in Figure 8 on
page 33, Figure 9 on page 34, and Table 14 on page 35.
Row count per rule in the collection.rowcountperrule_collection
Next preferred ID.next_preferred_id
Rule title.pol_name
Custom options.customOptions_collection
Comments about the firewall collection.comments
Collection enabled.enabled
Chapter 5: Security Data Model
service_collection
action
Rule group ID. (string)group_address
Rule group name.rb-link
VPN link associated with the policy type.vpnlink
Policy direction.direction
RAS VPN.dialupvpn
Address of the traffic source.src_addr_collection
Negates the specified source.negate_src
All VIPs. (Boolean)dst-all-vip
Destination address for the traffic.dst_addr_collection
Negates the specified destination.negate_dst
Configure theservices supported by the destination. If the service ofthe network traffic matches
a service selected inthe rule, the security device performs the actionthat you select in theAction
column. For more information, see “Service (service_collection)” on page 54.
Determinesthe actionto be performed by thesecurity devicewhen itdetects traffic that matches
the rule. The possible values are:
You can configure your security device to perform policy level network address translation (NAT)
for any zone to translate the source address of incoming and outgoing traffic. You can configure
the firewall to select a new source address from a Dynamic IP pool (DIP). For incoming traffic
only, use a Mapped IP (MIP).
A preferred-id is a rule ID,a number that uniquelyidentifies a rule within the rulebaseand security
policy. After you install a rule as part of a security policy on a security device, you can view the
rule by logging in locally to the device. However, when you view it through the Web UI or CLI, the
rule appears as an individual policy. The individual policy on the device has the same ID as the
rule in the management system, enabling you to determine which rules are on specific devices.
Deep inspection alert log.log
Select Counting if you want to count how many bytes the matching network traffic contains and
view this information in other applications. Possible values:
•
disabled
•
enabled
Action to be taken on the log. This can include configuring SNMP, Syslog, CSV, XML, script, and
e-mail settings.
Web filtering. (default = false)url-blk
URL protocol.url-protocol
Specifies the security devices or templates that will receive and use this rule. You can select
multiple security devices on which to install the rule.
You must include HTTP, FTP, or Telnet service objects in the Service column of the rule to enable
remote users to authenticate themselves using Authentication. You can include other services
as well, or specify all services.
If authentication succeeds, the NSM allows the remote user to establish a connection to the
destination address. If authentication fails, NSM drops the initial connection.
If the source address supports multiple remote user accounts (for example, a Unix host running
Telnet) or it is located behind a NAT device thatuses a single IP address for all NAT assignments,
only the first remote user from that source address must initiate andauthenticate anHTTP, FTP,
or Telnet connection. All subsequent remote users from that source address do not have to
authenticate, and can pass matching network traffic to the destination address.
If you useWebAuth, to make a connectionto the destination address in the rule, the remote user
must first initiate an HTTP connection to the WebAuth server. Your security device responds
with a login prompt. After the remote user provides a user name and password, NSM attempts
to authenticate the user credentials. If authentication succeeds, NSM permits the remote user
to establisha connection to the destination address. If authentication fails, NSM drops the initial
connection. The possible values:
•
no-auth
•
infranet-auth
•
auth
•
webauth
You can determine when a security device applies a rule tonetwork traffic bydefining a schedule
for the rule.
ha_session_backup
traffic
If youselect HA Session Backup, a rule with the Permitaction willnot be active whenthe session
switches to the modern link. When this happens, the rule takes the Deny action.
Traffic shaping enables you to control the amount of bandwidththat isavailableto thematching
network traffic in a rule. It also enables you to set a priority that determines how the security
device handles matching network traffic that exceeds the defined maximum bandwidth. For
security devices running ScreenOS 5.3 or later, you can also manage the flow of traffic through
the security device by limiting bandwidth at the incoming point. The possible values:
NOTE: You can override a service that is set in the Service column at the application layer. The
service set in the Service column remains in force for the transport layer.
Possible enumeration values:
•
DNS
•
FTP
•
HTTP
•
IMAP
•
SMTP
•
POP3
•
H245
•
Q931
•
RAS
•
PORTMAPPER
•
SIP
•
SQLNETV2
•
TALK
•
TFTP
•
REAL
•
RTSP
•
VDO
•
XING
•
IGNORE
•
MGCP_CA
•
MGCP_UA
•
PPTP
•
RSH
•
SCCP
•
AIM
•
YMSG
•
SMB
•
MSN
•
NBNAME
•
NBDS
•
NAS
•
NONE = No application specified. (default)
attack-policy
Security devices running ScreenOS 5.3 or later support Deep Inspection. A Deep Inspection (DI)
Profile object contains predefined attack object groups (created by Juniper Networks) or your
own custom attack object groups.
idp
Intrusion Detection and Prevention (IDP) is only supported on devices that have an IDP license
installed. When you install a IDP license, DI is disabled on the device.
You can use a GTP object in a firewall rule to determine how your security devices handles GTP
traffic
To detect viruses in network traffic, you can configure the rule to forward traffic to an antivirus
scanner. The server or Scan Manager returns the traffic—after it is cleaned or altered—and the
security device executes the action specified in the Action column.
Antispam.anti-spam
The IDP (rb_idp_collection) rulebase includes IDP rules that protect your network from
attacks by using attack objects to identify malicious activity and take action. When you
create an IDP rule, you specify the type of network traffic to be monitored for attacks
including the from and to zone, source IP and destination IP for the network traffic, and
service (type of IP traffic associated with the application layer protocols supported at
the destination IP address). In security policies, service objects define the type of traffic
that a rule must monitor.
These data elements are illustrated and described in Figure 10 on page 40 and Table 15
on page 41.
Row count per rule in the collection.rowcountperrule_collection
Next preferred ID.next_preferred_id
Rule number.ruleno
Comments about the IDP collection.comments
Custom options.customOptions_collection
Collection enabled.enabled
Chapter 5: Security Data Model
preferred-id
terminal
A rule ID is a number that uniquely identifies a rule within the rulebase and security policy. After
you install a rule as part of a security policy on a security device, you can view the rule by logging
in locally to the device. However, when you view it through the Web UI or CLI, the rule appears
as an individual policy. The individual policy on the device has the same ID as the rule in the
management system, enabling you to determine which rules are on specific devices.
Rule group name.rb-link
The source sends traffic from this zone.src_zone_collection
Address of the traffic source.src_addr_collection
Negates the specified source address.src_addr_negate
The source sends traffic to this zone.dst_zone_collection
Destination address for the traffic.dst_addr_collection
Negates the specified destination address.dst_addr_negate
Application layer protocols that are supported by the destination IP address.service
Makes a rule terminal. Traffic matching the source, destination, and service of a terminal rule is
not compared to subsequent rules even if the traffic does not match an attack object in the
terminal rule.
For each attack that matches a rule, you can choose an action that will occur if the IDP detects
interactive traffic. The following actions are possible:
•
Accept = IDP accepts the interactive traffic
•
Drop Connection = IDP drops the interactive connection without sending a RST packet reset
flag) to the sender. This prevents thetraffic from reaching itsdestination. This action is selected
to drop connections from traffic that is not prone to spoofing.
•
Close Client = IDP closes the interactive connection to the client but not to the server.
•
Close Server = IDP closes the interactive connection to the server but not to the client.
•
Close Client and Server = IDP closes the interactive connection and sends a RST packet to
both the client and theserver.If IDP isoperating in an inlinetap mode, IDP sends aRST packet
to both the client and the server but does not close the connection.
DiffServ Marking.diffserv
Attack objects represent specific patterns of malicious activity within a connection. They also
specify a method for detecting attacks.
Enables andconfigures an IP action to preventfuture malicious connections from the attacker's
IP address.
Deep inspection alert loglog
This parameter configures a rule thatonly applies to messages in specified VLANs. The possible
settings are:
•
Any (default) = Any rule will be applied to messages in any VLAN and to messages without
a VLAN tag. This setting has the same effect as not specifying a VLAN. Any can be sent to
devices that do not support VLAN tagging.
•
None = A rule will be applied only to messages that do not have a VLAN tag. Rules with this
value set cannot be sent to devices that do not support VLAN tagging.
•
vlan_list_collection =Specifies theVLAN tags to which the ruleapplies. You mustcreateVLAN
objects before applying them to the rules. Rules with this value set cannot be sent to devices
that do not support VLAN tagging.
log-actions
Action to be taken on the log. This can include configuring SNMP, Syslog, CSV, XML, script, and
e-mail settings.
severity
Severity of the attack. Within the IDP rulebase, you can override the ordinary attack severity on
a per-rule basis. Possible settings:
Specifies the security devices or templates that will receive and use this rule. You can select
multiple security devices on which to install the rule.
Multicast (rb_multicast_collection)
The multicast (rb_multicast_collection) rulebaseincludes multicast rules. Multicast rules
are statements that define specific types of multicast control traffic. When multicast
control traffic passes through a security device, the device attempts to match that traffic
against its list of rules. If a rule is matched, the device performs the action defined in the
rule against the matching traffic.
By default, security devices do not permit multicast control traffic (such as IGMP and
PIM-SM messages) to cross security devices. However, you can secure device multicast
control traffic through access lists. You can create an access listthat definesthe multicast
groups that hosts can join or to restrict the sources from which traffic is received, then
reference these access lists in multicast rules. To enable multicast control traffic to pass
between zones, you must configure multicast rules that specify the source zone (that
sends out multicast traffic), multicast group sending out the traffic, destination zone for
the traffic, and optionally, the destination group (source multicast group mapped to
another multicast group address).
These data elements are illustrated and described in Figure 11 on page 44 and Table 16
on page 44.
Table 16: Multicast Rulebase Data Elements (continued)
DescriptionData Element
From_zone exceptions.from_zone_exceptions
Chapter 5: Security Data Model
src-group
dst-group
target_collection
Multicast group(s) to which the multicast traffic is sent.
Multicast policy rules define the flow of multicast traffic between the source and
multicastgroups. You canuse thisparameterto specifyone particular multicast group,
any multicast group, or an access list that identifies the allowed multicast groups.
Destination zone. The source will send multicast traffic to this zone.to_zone
To_zone exceptions.to_zone_exceptions_collection
Destination group. Optionally, you can map the source multicast group address to
another multicast group address. When the source sends the multicast traffic to a
multicast group address, the security device translates the original multicast group
address to another address that you specified.
The rule applies to this type of multicast control traffic.message_type
Bi-directional policy.bi-directional
Custom options.customOptions_collection
Comment about the multicast collection.comments
Rule group name.rb-link
Specifies the security devices or templates that will receive and use this rule. You can
select multiple security devices on which to install the rule.
SYN Protector (rb_syndef_collection)
The SYN Protector (rb_syndef_collection) rulebase protects your network from
SYN-floods by ensuring that a three-way handshake is performed successfully for
specified TCP traffic. If you know that your network is vulnerable to a SYN-flood, use the
SYN-Protector rulebase to prevent it.
These data elements are illustrated and described in Figure 12 on page 46 and Table 17
on page 46.
Table 17: SYN Protector Rulebase Data Elements (continued)
DescriptionData Element
Comments about the SYN Protector collection.comments
Custom options.customOptions_collection
Collection enabled.enabled
Traffic source address.src_addr_collection
Negates the specified source address.src_addr_negate
Traffic destination address.dst_addr_coillection
Negates the specified destination address.dst_addr_negate
Chapter 5: Security Data Model
service
mode
severity
log
vlan
The default service, TCP-any, looks for SYN floods in all TCP-based traffic.
NOTE: Always set the SYN Protector service value to TCP-any. Selecting individual services
can cause unpredictable interactions with other rulebases.
Select the mode that indicates how IDP handles TCP traffic. The possible values are:
•
None = no action taken.
•
Relay = IDP acts as the middleman or relay for the established connection.
•
Passive = IDP handles the transfer of packets between the client host and the server but
does not prevent the connection from being established.
Severity of the attack. Within the IDP rulebase, you can override the ordinary attack severity
on a per-rule basis. Possible settings:
•
Default
•
Info
•
Warning
•
Minor
•
Major
•
Critical
You can configure the system to log an attack and create log records with attack information.
This logged information can be viewed in real-time through the Log Viewer.
This parameter configuresa rulethat only appliesto messages in specifiedVLANs. Thepossible
settings are:
•
Any (default) = Any rule will be applied to messages in any VLAN and to messages without
a VLAN tag. This setting has the same effect as not specifying a VLAN. Any can be sent to
devices that do not support VLAN tagging.
•
None = A rule will be applied only to messages that do not have a VLAN tag. Rules with this
value set cannot be sent to devices that do not support VLAN tagging.
•
vlan_list_collection = Specifies the VLAN tags to which the rule applies. You must create
VLAN objects before applying them to the rules. Rules with this value set cannot be sent to
devices that do not support VLAN tagging.
Table 17: SYN Protector Rulebase Data Elements (continued)
DescriptionData Element
log-actions
target_collection
Action to be taken on the log. This can include configuring SNMP, Syslog, CSV, XML, script,
and e-mail settings.
Specifies the security devices or templates that will receive and use this rule. You can select
multiple security devices on which to install the rule.
Traffic Anomalies (rb_tsig_collection)
The traffic anomalies (rb_tsig_collection) rulebase protect your network from attacks
by using traffic flow analysis to identify attacks that occur over multiple connections and
sessions (such as scans).
These data elements are illustrated and described in Figure 13 on page 49 and Table 18
on page 49.
Table 18: Traffic Anamolies Rulebase Date Elements (continued)
DescriptionData Element
Rule number.ruleno
Comments about the traffic anomalies collection.comments
Rule group name.rb-link
Custom options.customOptions_collection
Collection enabled.enabled
Address of the traffic source.src_addr_collection
Negates the specified source address.src_addr_negate
Destination address for the traffic.dst_addr_collection
traffic
Negates the specified destination address.dst_addr_negate
Serviceservice
Specifies how IDP will treat matching traffic. Possible values:
•
Ignore = The IDP Sensor ignores the traffic.
•
Detect = The IDP Sensor detects the traffic but does not log it.
•
TCP and UDP Port Scans = The IDP Sensor logs a TCP or UDP Port Scan, recording the TCP
or UDP ports and a time interval during which the IDP Sensor records count of that number
of TCP or UDP ports. For example, assume that the Port Count is 4 and the Time Threshold
is 2 seconds. If the IDP Sensor monitors 4 TCP or UDP ports over 2 seconds from the same
source IP to the same destination IP, the IDP Sensor logs it as a TCP or UDP port scan.
•
Distributed Port Scan = The IDP Sensor logs a Distributed Port Scan, recording the count of
unique IP addresses and a time interval during which the IDP Sensor records count of that
number of number of distributed addresses or ports. For example, the IP Count is 4 and the
Time Threshold is 2 seconds. If the IDP Sensor monitors 4 IP addresses over 2 seconds from
the same source IP to the same destination IP, the IDP Sensor logs it as a distributed port
scan.
•
ICMP Sweep =The IDPSensor logsan ICMP Sweep, recording the count ofunique IPaddresses
and a time interval during which the IDP Sensor records count of that number of IP addresses.
For example, the IP Count is 4 and the Time Threshold is 2 seconds. If the IDP Sensor monitors
4 IP addresses over 2 seconds from the same source IP, the IDP Sensor logs it as an ICMP
sweep.
•
Network Scan = The IDP Sensor logs a Network Scan, recording the count of unique IP
addresses and a time interval during which the IDP Sensor records count of that number of
IP addresses. For example, the IP Count is 4 and the Time Threshold is 2 seconds. If the IDP
Sensor monitors 4 IP addresses over 2 seconds from the same source IP, the IDP Sensor logs
it as a network scan.
ipaction
Enables and configures an IP action to prevent future malicious connections from the attacker's
IP address.
Table 18: Traffic Anamolies Rulebase Date Elements (continued)
DescriptionData Element
Chapter 5: Security Data Model
log-actions
vlan
severity
Log action settings. Possible settings include configuring:
•
SNMP
•
Syslog
•
CVS
•
XML
•
script
•
e-mail
This parameter configures a rule that only applies to messages in specified VLANs. The possible
settings are:
•
Any (default) = Any rule will be applied to messages in any VLAN and to messages without
a VLAN tag. This setting has the same effect as not specifying a VLAN. Any can be sent to
devices that do not support VLAN tagging.
•
None = A rule will be applied only to messages that do not have a VLAN tag. Rules with this
value set cannot be sent to devices that do not support VLAN tagging.
•
vlan_list_collection = Specifies the VLAN tags to which therule applies.You must create VLAN
objects before applying them to the rules. Rules with this value set cannot be sent to devices
that do not support VLAN tagging.
Severity of the attack. Within the IDP rulebase, you can override the ordinary attack severity on
a per-rule basis. Possible settings:
•
Default
•
Info
•
Warning
•
Minor
•
Major
•
Critical
target_collection
Specifies the security devices or templates that will receive and use this rule. You can select
multiple security devices on which to install the rule.
Network Honeypot (rb_portfaker_collection)
The network honeypot rulebase (rb_portfaker_collection) protects your network by
impersonating open ports on existing servers on your networkand alertingyou to attackers
performing port scans and other information-gathering activities.
These data elements are illustrated and described in Figure 14 on page 52 and Table 19
on page 52.
Table 19: Network Honeypot Rulebase Data Elements (continued)
DescriptionData Element
Rule numberruleno
Comments about the network honeypot (portfaker) collection.comments
Collection enabled.enabled
Portfaker Link collectionrb_link
Custom options.customOptions_collection
Address of the traffic source.src_addr_collection
Negates the specified source address.src_addr_negate
Destination address for the traffic.dst_addr_collection
Chapter 5: Security Data Model
ipaction
log-actions
vlan
Negates the specified destination address.dst_addr_negate
Serviceservice
Operationop
Enables and configures an IP action to prevent future malicious connections from the
attacker's IP address.
Logginglog
Action to be taken on the log. This can include configuring SNMP, Syslog, CSV, XML, script,
and e-mail settings.
This parameter configures a rule that only applies to messages in specified VLANs. The
possible settings are:
•
Any (default) = Any rule will be applied to messages in any VLAN and to messages
without a VLAN tag. This setting has the same effect as not specifying a VLAN. Any can
be sent to devices that do not support VLAN tagging.
•
None = A rule will be applied only to messages that do not have a VLAN tag. Rules with
this value set cannot be sent to devices that do not support VLAN tagging.
•
vlan_list_collection = Specifies the VLANtags to which the rule applies. Youmust create
VLAN objectsbefore applying them to the rules. Rules withthis valueset cannot be sent
to devices that do not support VLAN tagging.
Table 19: Network Honeypot Rulebase Data Elements (continued)
DescriptionData Element
severity
target_collection
Severityof theattack. Within theIDP rulebase, you canoverride the ordinaryattack severity
on a per-rule basis. Possible settings:
•
•
•
•
•
•
Log packets.seslog
Specifies the security devices or templates that will receive and use this rule. You can
select multiple security devices on which to install the rule.
Service (service_collection)
The service collection (service_collection) defines services. These services represent the
types of IP traffic that are associated with protocol standards. In a security policy, a
service object defines the type of traffic that the rule will monitor. Related services are
aggregated into service groups.
These data elements are illustrated and described in Figure 15 on page 55 and Table 20
on page 55.
Table 20: Service Collection Data Elements (continued)
DescriptionData Element
Sourcesource
ICMP type.type
Comments about the service collection.comment
Predefined (Boolean)predefined
Predefined service is available.avail
Category of service type.category
IDP nameidpname
Firewall namefwname
Address (address_collection_type)
The address collection (address_collection_type) enables you to work with addresses.
Addresses are the workstations, routers, switches, subnetworks, and other components
that are connected to your network. In multicast routing, a multicast address specifies
the multicast group to which the data is sent. Related addresses may be aggregated into
address groups.
These data elements are illustrated and described in Figure 16 on page 57 and Table 21
on page 57.
The schedule object collection (scheduleobj_collection_type) enables you to work with
schedules. Schedules define a time range during which a security policy rule is in effect.
These data elements are illustrated and described in Figure 17 on page 58 andTable 22
on page 58.
The attack collection (attack_collection) enables you to counter attacks. You can
configure basic information about possible attacks such as attack object severity, external
references, names, and so on. You can include additional information, including general
descriptions and keywords that make it easier to locate and maintain an attack object
in your security policies.
NOTE: The fields that can be edited depend on the object type, compound
attack object, protocol anomaly object, and signature of the attack. The
signature can provide information about the protocol and context used to
perpetrate the attack, whether or not the attack is considered malicious,
direction and flow of the attack, signature pattern of the attack, and the
values found in the header section of the attack traffic.
Table 23: Attack Collection Data Elements (continued)
DescriptionData Element
severity
Antivirus (avobj_collection)
The Antiviruscollection (avobj_collection) enables you to configureyour security policies
to include antivirus data. These data elements are illustrated and described in Figure 18
on page 63 and Table 24 on page 63.
Attackseverity orinformation about theattack. Possible values:
Table 24: Antivirus Collection Data Elements (continued)
DescriptionData Element
Mime type lists.mime-list_collection
Profileprofile_collection
HTTPhttp
GTP (gtpobj_collection_type)
The GPRS TunnelingProtocol (GTP) collection (gtp_collection) enables you to configure
your security policies to handle GTP traffic. These data elements are illustrated and
described in Figure 19 on page 65 and Table 25 on page 65.
A Deep Inspection (DI) Profile collection contains predefined attack object groups
(supplied by Juniper Networks) and your own custom attack object groups.
These data elements are illustrated and described in Figure 20 on page 67 and Table 26
on page 67.
Figure 20: DI Profile
Chapter 5: Security Data Model
Table 26: DIP Data Elements
Global DIP (globaldip_collection)
The Global Dynamic IP (DIP) collection (globaldip_collection) data elements represent
various global DIP settings in a security policy.
DescriptionData Element
DI Profile collection.DIProfile
Name of the DI Profile type.name_
DI Severitydi-severity
Sign category associated with the DIProfile type.sigcategory
This section explains how to use the Perl Client library for NSM to access the NSM API.
The library is located in the directory $NSROOT/GuiVar/webproxy/clienton NSM server.
•
Login and Logout on page 81
Login and Logout
Enter the following commands to log into and log out of the Perl Client Library.
# Login:
my $host = [your hostname or IP here]
my $connect = MAIN::NSM->new('HOST'=>"$host");
$connect->login;