United Security Products 10-4 manuels

Manuels d'utilisation et guides de l'utilisateur pour Téléphones United Security Products 10-4.
Nous fournissons des manuels en pdf 2 United Security Products 10-4 à télécharger gratuitement par type de document : Spécifications, Manuel du propriétaire


Table des matières

MAN-0283-02

1

Product Version

3

Publication Date

3

Legal Notices

3

Standards Compliance

4

Acknowledgments

4

Table of Contents

10

Configuring Anomaly Detection

11

Maintaining Security Policies

11

Working with Parameters

12

Protecting XML Applications

13

Displaying Reports

14

Security Policy Violations

15

◆ Attack Signature protection

19

◆ Positive security model

20

◆ Role-based administration

20

◆ The navigation pane

21

◆ The menu bar

21

◆ The body

21

◆ Run the Deployment wizard

25

Defining a local traffic pool

26

Running the Deployment wizard

29

To view the monitoring tools

30

Paths traffic classifier

37

◆ Send to pool

40

To rewrite a URI

41

Chapter 3

42

Working with Web Applications

43

What is a web application?

45

Re-enabling a web application

52

◆ Set up the security policy

55

Changing the policy type

60

To change the policy type

61

Chapter 5

62

◆ Stabilize (Tighten)

69

◆ Track Site Changes

69

Configuration screen

70

Creating security policies

81

◆ Transparent mode

83

◆ Blocking mode

83

To activate iRule events

90

To activate a security policy

92

Adding file types

96

Creating allowed file types

97

Modifying file types

99

Removing file types

99

To disallow a file type

100

Configuring URLs

101

Chapter 6

102

Overview of URL flows

103

Creating an explicit URL

104

To remove a URL

105

To view or modify a URL

105

To add disallowed URLs

106

Application Security Manager

107

To configure AMF security

108

Configuring flows

110

Adding a flow to a URL

111

To configure a dynamic flow

112

To configure login URLs

113

Masking sensitive data

115

To delete an allowed cookie

118

Configuring mandatory headers

119

Configuring allowed methods

120

Configuring CSRF protection

128

What is anomaly detection?

133

Recognizing DoS attacks

134

◆ Dropped request

145

◆ Grace interval

145

Maintaining a security policy

149

To copy a security policy

151

To export a security policy

152

To import a security policy

152

Merging two security policies

153

To restore a security policy

155

Chapter 8

160

Overview of wildcard entities

163

Understanding tightening

164

Understanding staging

165

◆ Check for explicit matches

166

◆ Check for wildcard matches

166

Creating wildcard file types

167

Modifying wildcard file types

168

Deleting wildcard file types

169

Sorting wildcard file types

170

Configuring wildcard URLs

171

To modify a wildcard URL

173

To delete a wildcard URL

173

Sorting wildcard URLs

174

Creating wildcard parameters

175

Modifying wildcard parameters

177

Deleting wildcard parameters

177

Ordering wildcard parameters

178

◆ Yellow

181

◆ Orange

181

Understanding parameters

185

To create a global parameter

186

To edit a global parameter

188

To delete a global parameter

188

Working with URL parameters

189

/url_name.ext

190

To delete a parameter

191

Working with flow parameters

192

◆ Ignore value

196

◆ Static content value

196

◆ Dynamic content value

196

◆ Dynamic parameter name

196

◆ User-input value

196

◆ XML value

197

To create an XML parameter

207

Overview of attack signatures

219

Chapter 11

222

Ensuring network access

228

To enforce all signatures

242

To upload certificates

256

Writing XPath queries

262

Managing SOAP methods

263

Chapter 12

268

Masking sensitive XML data

269

To edit an XML profile

273

To delete an XML profile

274

To view learning suggestions

279

To clear learning suggestions

284

Disabling violations

292

To disable a violation

293

To clear a violation

293

Viewing ignored entities

294

Chapter 13

296

To configure SMTP

312

Chapter 15

320

Figure 15.3 Request details

320

To export requests

321

Viewing charts

322

To view graphical charts

323

Interpreting graphical charts

324

Viewing anomaly statistics

326

Filtering reports

331

Monitoring CPU usage

332

RFC violations

337

Appendix A

338

Access violations

339

Length violations

340

Input violations

342

Cookie violations

345

Negative security violations

346

Security Policies

349

Signatures

365

, on page C-9, for syntax

368

A note about normalization

370

Using the content rule option

371

Using the pcre rule option

372

Summary of pcre modifiers

373

Using the nocase modifier

374

Using the offset modifier

375

Using the depth modifier

375

Using the distance modifier

376

Using the within modifier

377

Using the objonly modifier

378

Using the norm modifier

378

Using character escaping

379

Combining rule options

380

Rule combination example

381

Appendix C

382

Configuration

383

Appendix D

386

Viewing internal parameters

388

Important

393

Performing the migration

394

Viewing cluster statistics

398

Appendix F

400

Glossary

401

Glossary - 1

403

Glossary - 2

404

Glossary - 3

405

Glossary - 4

406

Glossary - 5

407

Glossary - 6

408

Glossary - 7

409

Glossary - 8

410

Glossary - 9

411

Glossary - 10

412

Glossary - 11

413