The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following
information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it
is not installed in accordance with NetScreen’s installation instructions, i t may cause interference wi th radio and tele vision reception. This equip ment has
been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These
specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that
interference will not occur in a particular installation. If this equipmen t does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipme nt and receive r. Consult t he dealer o r an experienced ra dio/TV
technician for help. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warrant y and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET
THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE
SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
The STRM Application Configuration Guide provides you with information on how
to investigate various types of security threats using th e Offense Manager, Event
Viewer, or the Flow Viewer.
ConventionsTable 1 lists conventions that are used throughout this guide.
Table 1 Icons
IconTypeDescription
Information noteInformation that describes important features or
instructions.
CautionInformation that alerts you to potential loss of
data or potential damage to an application,
system, device, or network.
WarningInformation that alerts you to potential personal
injury.
Technical
Documentation
Documentation
Feedback
You can access technical documentation, technical notes, and release notes
directly from the Juniper networks Support Web site at
www.juniper.net/support/.
http://
We encourage you to provide feedback, comments, and suggestions so that we
can improve the documentation. Send your comments to
techpubs-comments@juniper.net, orfill out the documentation feedback form at
http://www.juniper.net/techpubs/docbug/docbugreport.html. If you are using e-mail, be
sure to include the following information with your comments:
•Document name
•Document part number
•Page number
•Software release version
STRM Default Application Configuration Guide
2ABOUT THIS GUIDE
Requesting
Support
•Open a support case using the Case Management link at
http://www.juniper.net/support/ or call 1-888-314-JTAC (from the United States,
Canada, or Mexico) or 1-408-745-9500 (from elsewher e).
STRM Default Application Configuration Guide
1
DEFINING APPLICATION MAPPINGS
By default, STRM can classify many applications. When creating new or
customized application mappings, you must:
Step 1 Update the Application Views in the STRM Administration interface, which
contains group and object information. For more information on updating the
Applications Views, see the STRM Administration Guide.
Step 2 Configure the application mapping parameters in the Flow Collector parameters.
For more information, see the STRM Administration Guide.
Step 3 Update the mapping file, which contains user defined application mappings. This
file maps user defined applications with STRM’s Application Views.
Step 4 Deploy the changes to other systems through the Administration Console. For
more information, see the STRM Administration Guide.
This chapter provides information on configuring and editing applications in STRM
including:
About the STRM
Applications View
•About the STRM Applications View
•Defining Application Mappings
Once a flow is detected, STRM assigns an application ID to the flow based on the
content of the flow, the protocol used for the flow, and the port. The particular
application ID assigned to a flow depends on the values configured in the mapping
files. This file also allows the application ID to be mapped to values defined in the
Application View of your STRM interface, which also allows the classified data to
be stored and displayed on the STRM graphs, based on the defined application ID.
Figure 1-1 shows an example of the Chat Application View in the STRM interface,
which shows the associated ID in the Values column.
STRM Default Application Configuration Guide
2DEFINING APPLICATION MAPPINGS
Figure 1-1 Example of Application View
Y o u can edit the user defined mapping file to ensure specific traffic is appropriately
classified in the STRM interf ace. Ho wever, STRM also includes default application
IDs, which you can view in the Applications View of the STRM interface. For
example, in Figure 1-1, the Chat group includes the default AOL group, which is
defined in the default mapping file to ensure all AOL traffic is assigned a value of
3001. For more information on the default values, see Chapter 2Default
Applications.
Note: For more information on enabling or disabling application detection, see the
STRM Administration Guide.
Defining
Application
Mappings
To define application mappings:
Step 1 Using SSH, log in to STRM.
Step 2 Open the following file:
Note: To edit the name of the user_application_mapping.conf file, you can edit the
User Application Mapping parameter in the Flow Processor configuration window.
For more information, see the STRM Administration Guide. If the
user_application_mapping.conf does not exist in your system, create the file and
place the empty in the above directory.
Step 3 Update the file, as necessary.
When updating the file, note the following:
•Each line in the file indicates a new mapped application. You can specify
multiple mappings (each on a seperate line) for the same application.
•You can specify a wildcard character * for any of the fields. The wildcard
character must be used alone and not part of a comma separated list. The
wildcard character indicates that this field applies to all flows.
STRM Default Application Configuration Guide
Defining Application Mappings3
•Since it is possible for a flow to be associated with multiple mappings, a flow is
mapped to an application ID based on the order of the file. The first mapping
that applies in the file is assigned to the flow.
•When adding new application identification numbers, we recommend that you
apply numbers ranging between 15,000 to 20,000 . Contact Juniper Networks
Customer Support for further information.
The format of the entry must resemble the following:
<New ID> <Old ID> <Source IP Address>:<Source Port> <Dest IP
Address>:<Dest Port> <Name>
Where:
•<New ID> specifies the application ID you wish to assign to the flow. A value of
1 indicates an unknown application. If the ID you wish to assign does not exist,
you must create the ID using the Application View in the STRM interface. For
more information, see the STRM Administration Guide.
•<Old ID> specifies the default application ID of the flow, as assigned by
STRM. A value of * indicates a wildcard. For more information on the default
values, see Chapter 2Default Applications.
•<Source IP Address> specifies the source IP address of the flow. This field
may contain either a comma separated list of addresses or CIDR values. A
value of * indicates a wildcard, which means that this field applies to all flows.
•<Source Port> specifies the associated port. This field may contain a comma
separated list of values or ranges specifies in the format: <lower port
number>-<upper port number>. A value of * indicates a wildcard, which means
that this field applies to all flows.
•<Dest IP Address> specifies the destination IP address of the flow. This field
may contain either a comma separated list of addresses or CIDR values. A
value of * indicates a wildcard, which means that this field applies to all flows.
•<Dest Port> specifies the associated destination source port. This field may
contain a comma separated list of values or ranges specifies in the format:
<lower port number>-<upper port number>. A value of * indicates a wildcard,
which means that this field applies to all flows.
•<Name> specifies a name you wish to assign to this mapping. This field is
optional.
For example, the below example maps all flows that match the IP addresses and
ports for which the Flow Collector has assigned to the Old ID of 1010 and assign
the new ID of 15000:
Step 4 Save and exit the file.
Step 5 Log-in to STRM.
Step 6 Click Config to access the Administration Console.
Step 7 If necessary, edit your Application View.
STRM Default Application Configuration Guide
4DEFINING APPLICATION MAPPINGS
Note: For information on creating or editing views, see the STRM Administration
Guide.
Step 8 From the menu, select Configurations > Deploy configuration changes.
STRM includes default application IDs, which you can view in the Applications
View of the STRM interface. This chapter provides the default application values
as they appear in the Applications View. The default application values apply to all
source and destination flows, however, the destination port is specific to the
application.
For more information on the Application View, see the STRM Administration
Guide.
Table 2-1 provides the default Application values for STRM:
Table 2-1 Default Applications
Application View
Group
ChatAOL-ICQ3001AOL Instant Messenger
ChatCUSeeMe60016CUSeeMe traffic.
ChatGoogle3006Google IM traffic.
ChatICQ3002ICQ traffic.
ChatJabber3004Jabber protocol traffic.
ChatLotus-IM60162Lotus IM traffic.
ChatMSN3000MSN traffic.
ChatMisc_IM3005Misc IM traffic.
ChatWindows-POPUP60170Windows Messenger Service