EasyManuals Logo
Home>Juniper>Software>JUNOS 10.1 - RELEASE NOTES REV 4

Juniper JUNOS 10.1 - RELEASE NOTES REV 4 User Manual

Juniper JUNOS 10.1 - RELEASE NOTES REV 4
205 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #170 background imageLoading...
Page #170 background image
When Q-in-Q tunneling is configured for a service providers VLAN, all routing
engine packets, including packets from the routed VLAN interface, that are
transmitted from the customer-facing access port of that VLAN will always be
untagged
Intrusion Detection and Prevention (IDP)
The JUNOS Software Security Configuration Guide does not state that custom
attacks and custom attack groups in IDP policies can now be configured and
installed even when a valid license and signature database are not installed on
the device.
The JUNOS Software CLI Reference is missing information about the following
IDP policy template commands:
Use this command to display the download status of a policy template:
user@host>request security idp security-package download status
Done; Successfully downloaded from
(https://devdb.secteam.juniper.net/xmlexport.cgi).
Use this command to display the installation status of a policy template:
user@host>request security idp security-package install status
Done;policy-templates has been successfully updated into internal
repository
(=>/var/db/scripts/commit/templates.xsl)!
The ip-action definition on SRX3400, SRX3600, SRX5600, and SRX5800 in the
JUNOS Software Security Configuration Guide on page 504 Table 73 is incorrect.
The correct definition should be as follows: Enables you to implicitly block a
source address to protect the network from future intrusions while permitting
legitimate traffic. You can configure one of the following IP action options in
application-level DDoS: ip-block, ip-close, and ip-notify.
The exclude-context-values option in the JUNOS Software Security Configuration
Guide on page 810 Table 101 is missing. The definition for exclude-context-values
should be as follows: Configure a list of common context value patterns that
should be excluded from application-level DDoS detection. For example, if you
have a Web server that receives a high number of HTTP requests on home/landing
page, you can exclude it from application-level DDoS detection.
The JUNOS Software CLI Reference and the JUNOS Security Configuration Guide
states that the maximum acceptable range for the timeout (IDP Policy) is 65,535
seconds, whereas the ip-action timeout range has been modified to 0-64800
seconds.
The JUNOS Software CLI Reference and the JUNOS Security Configuration Guide
are missing information about the new CLI option download-timeout, which has
been introduced to set security idp security-package automatic download-timeout
< value >, to configure the download timeout in minutes. The default value for
download-timeout is one minute. If download is completed before the
download-timeout, signature is automatically updated after the download. If the
download takes longer than download-timeout, auto signature update is aborted.
170 Errata and Changes in Documentation for JUNOS Release 10.1 for SRX Series Services Gateways and J Series Services
Routers
JUNOS 10.1 Software Release Notes

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Juniper JUNOS 10.1 - RELEASE NOTES REV 4 and is the answer not in the manual?

Juniper JUNOS 10.1 - RELEASE NOTES REV 4 Specifications

General IconGeneral
BrandJuniper
ModelJUNOS 10.1 - RELEASE NOTES REV 4
CategorySoftware
LanguageEnglish

Related product manuals