NSS Group logo

NetScreen-IDP 500  V 2.1

Is the product supplied as software only or as a hardware appliance? If supplied as an appliance, please provide the hardware specification (CPU, memory, network cards, etc)The sensor is an appliance, with the management server delivered as software and the interface as an application. The IDP 500 hardware specification inlcudes a P4 processor with 4GB of RAM 

What is the maximum speed/network load (Mbps) claimed with zero packet loss?
NetScreen has three different products to accommodate the performance requirements for different network segments. The NetScreen-IDP 10 provides 20Mbps nominal throughput and is designed for small, low-speed network segments.  The NetScreen-IDP 100 offers 200Mb maximum throughput (1500 byte packets) and is designed for a regional office  or medium central site. The NetScreen-IDP 500 provides 500Mb maximum throughput (1500 byte packets) and is generally placed in large central sites.

At the maximum load, what is the maximum TCP connection rate (connections per second) claimed?
All IDP Platforms can handle approximately 12,000 TCP sessions per second under normal conditions.  At the maximum advertised load, the IDP platforms can handle approximately 2,000 TCP sessions per second, depending upon which types of signatures are loaded (i.e. if a lot of packet-based signatures, which look for attack pattern matches in all of traffic, have been imported and enabled performance can be affected).

Product architecture (2-tier/3-tier management? Brief description)
NetScreen-IDP has a true three-tier management architecture comprised of a detection and enforcement tier (sensor), a management tier (server) and an application tier (user interface).

The NetScreen-IDP Sensors are based on a network appliance platform running a derivative of a Linux based kernel.  Sensors can operate either as a traditional passive based IDS product or as an in-line product. 

The NetScreen-IDP Management Server is a software component running on either Intel-based RedHat Linux 7.2 or a SPARC system running Sun Solaris 7/8.  The NetScreen-IDP Management Server stores all log and policy information for all NetScreen-IDP units in an enterprise. The centralised management server reports to multiple user interface consoles for alerts. It also sends e-mail alerts to all security administrators and/or sends syslog messages / SNMP traps to multiple managers. The notification is configured on a per rule basis.

The NetScreen-IDP User Interface is available for either Linux or Windows platforms. Multiple user interfaces can connect to a single management server to perform all management operations.

What are the minimum/recommended sensor OS and hardware requirements? Is a dedicated machine required/recommended?
Dedicated appliance

What are the minimum/recommended console OS and hardware requirements? Is a dedicated machine required/recommended?
The NetScreen-IDP UI can be loaded onto any Windows 2000/XP or RedHat 7.2 machine.  NetScreen recommends that you have a minimum of 512Mb of RAM on the IDP UI system and a Pentium III or greater for best performance.

What are the minimum/recommended management server OS and hardware requirements (if applicable)? Is a dedicated machine required/recommended?
The NetScreen-IDP Management System requires an enterprise class server running Sun Solaris 7/8 (SPARC) or Linux RedHat 7.2 (Intel).  400Mhz SPARC/1GHz Intel, 512 MB Memory, RAID. 2GB memory is recommended for larger deployments.

List required open ports on sensor and their use

There are two open ports required on the sensor:

          IDP�s sciod uses port 7101 (Used to configure sensor and push policy from management server)

          IDP�s sessionFetcher uses port 7102 (Used to fetch session data)

List required open ports on management server (if applicable) and their use

There are three open ports required on the management server:

          IDP�s statusReceiver uses port 7201 (Used to receive status information from sensor)

          IDP�s logReceiver uses port 7202 (Used to receive log from sensor)

          IDP�s pingerTracer usesport 7204

List required open ports on GUI/management console and their use

There is one open port required on the GUI console:

          IDP�s guiDaemon uses port 7203 (Used to communicate between management server and GUI console)

Communication protocol between sensor and management server
All communication between the different tiers of NetScreen-IDP solution are authenticated and encrypted, using RSA, Blowfish, SHA-1. Connection messages are validated using RSA and the payload messages are validated using HMAC'ed SHA1 in CBC mode with an IV.

Communication protocol between management server and GUI/console
All messages are validated using HMAC'ed SHA1 in CBC mode with an IV.

Encryption between sensor and management server

The encryption between the sensor and the management server are 1024 bit RSA keys (created at device initialization) and a 128 bit Blowfish key.

Encryption between management server and GUI/console
The encryption between the management server and the GUI are 256 bit dynamically-generated (per-connection) RSA keys and a 128 bit Blowfish key.

Once deployed and configured, can sensors be managed from a central console?
Yes, the NetScreen-IDP system uses a centralised, rule-based management approach that enables customers to control the security of their network through a single, enterprise-wide policy.

The concept of a centralized, Security Policy also allows the application of the same Security Policy to as many enforcement points as required. Deviation from one device to another does not require a new Security Policy; it is simply accomplished by specifying to which sensor each of the individual rules within the Security Policy applies. As a result, the system can be configured to only look for attacks relevant to the potential vulnerabilities of that portion of the network, such as IIS attacks against the IIS servers. One policy can be applied to an entire network with different rules pertaining to different sensors, or multiple policies can be created and deployed to sensors individually.

Capacity of the system? How many endpoints can be monitored? Ratio of endpoints to management servers/consoles, etc.
The NetScreen-IDP system is designed so that hundreds of sensors may be managed from a central server. Management server resources, such as network interface speeds, processor speeds, available memory, amount of log data, and available disk space dictate the practical limit.  That said, on a normal 100 megabit enterprise network, it is possible to manage 100 sensors from one management station with the following management server configurations:

          Solaris 7/8 server running a 400MHz processor, 1 GB RAM, 18GB disk.

          RedHat Linux 7.2 server running a 1GHz Pentium-IV processor, 1 GB RAM, 18GB disk.

What anti-flooding methods are employed (sensor to management server, and management server to console)?
When logs overload the system, there are multiple actions taken by the NetScreen-IDP system to prevent overloading the management server. If the server does not acknowledge receiving logs, the sensor will retransmit the logs and keep them saved locally until the management server is ready to accept more logs. One of the architectural reasons for designing a proprietary database for NetScreen-IDP was to increase the speed at which logs could be collected at the management server. Typical commercial databases are significantly slower than the NetScreen-IDP database for collecting logs. 

Maximum insertion rate into alerts database?
Approximately 50,000 logs per second can be inserted into the alerts database for an IDP-500 with a dedicated interface to the Management Server.

Maximum size of database?
The size of the database is limited only by available disk space on the IDP Management Server.

Maximum number of alerts stored on the Sensor?
If communications are disrupted, the IDP Sensor will cache logs locally (in a first-in, first-out basis). The sensor has 10 Gigabytes of storage dedicated to log storage and packet log storage. 

What happens to alerts in main alert database once capacity limits exceeded (deleted/archived/etc)?
If capacity in the database is exceeded, the oldest day�s alerts that are stored will be purged (deleted) automatically.

What is maximum recommended size of alerts database to maintain acceptable query performance?
Less than 200Mb is the recommended database size for the most optimal results. 

When alerts are removed from the main alert database, are they still available for reporting directly (i.e. can reporting tools merge current and archived alerts)?
NetScreen-IDP logs can be manually stored offline to clear room in the alerts database for new logs. Stored logs can be moved back later, if the customer wants to do additional reporting or analysis with NetScreen-IDP�s log viewer and reporting tools.

Which database product is used for alert storage? Is schema open?
NetScreen uses a proprietary database, however, logs can be exported to CSV file or a Posgress SQL Database.

What happens when communications between sensor and management server/console are interrupted? Local logging on sensor? Maximum capacity? What happens when local sensor logs are full? Is the local repository secure?
If communications are disrupted, the IDP Sensor will cache logs locally (in a first-in first-out basis). The Sensor has 10 Gigabytes of storage dedicated to log storage and packet storage.  This is stored on an EXT3 type file-system with UNIX-style permissions. If the disk is full the oldest packet captures will be purged first, then oldest log files.  When communication is resumed, Log messages will be sent to the Management Server. 

Secure logon for policy management?
Yes, NetScreen-IDP provides secure login for policy management. The encryption between the management server and the GUI is 256 bit dynamically generated (per-connection) RSA keys and a 128 bit Blowfish key.  This is used to protect an administrator�s authentication credentials.

Granular access (i.e. read only/read-write/etc) granted on a per-user basis? What levels of granularity are supported?
Yes, NetScreen can provide granular access granted on a per-user basis. Unlimited administrators may be defined on each IDP Management Server, and each administrator will have either full (read/write) access or limited (read-only) access.  Only the Super-user Administrator has access to add and delete other Administrators.

Is it possible to define multiple policies for the sole purpose of distributing to multiple sensors with different functions?
Yes. The security policy is made up of rules that dictate what traffic the device should look at, what attacks in that traffic to look for, what to do when those attacks are detected and to which sensors that rule applies. As a result, from a single enterprise-wide policy, rules can be distributed to multiple sensors to ensure they are detecting and preventing completely different things. These rules can be for individual sensors or groups of sensors, making it easy to create a policy that adequately protects different areas of the network. In addition, this flexibility enables the creation of rules that look for different things in the same traffic and treat that traffic differently.

How are policies distributed to sensors?
Policies are configured by the Administrator through the IDP GUI and compiled by the IDP Management Server prior to being installed on appropriate Sensors through the secure communications channel.  The encryption between the sensor and the management server are 1024 bit RSA keys (created at device initialization) and a128 bit Blowfish key.  The IDP Administrator may push policies to individual sensors or all sensors.

Can policies be deployed on a per-sensor or per-group basis, or globally only?
Policies can be distributed globally, on a per-sensor basis, a per-group basis, or any combination of those choices. This is because when the policy is created the administrator defines exactly how the policy rules should be distributed. For example, an administrator may create a few rules that apply to all of the sensors, a few others that apply to different groups of sensors, and a few that only apply to an individual sensor.

How are policy changes handled? Will the central console detect which agents are using a changed policy and redeploy automatically, or does the administrator have to do this manually?
Once changes are made to a policy and that policy is pushed live, the system will automatically identify what has been changed in the policy and make those changes at the relevant sensors. Because rules can be defined on a per-sensor basis, a single policy will be pushed to the relevant sensors automatically.

Can policy deployment be scheduled?
No, policy updated musts be performed by the IDP Administrator.

Does the sensor remain able to detect alerts at all times during policy/signature updates? Explain how this is achieved.
Yes, the sensor is able to detect alerts at all times during policy/signature updates. While the policy updates are downloaded to the IDP Sensor it continues to process traffic and alert or block attacks based on the previous policy.  At the moment the new policy is loaded current connections are not disrupted.

Can the administrator define custom attack signatures?
NetScreen-IDP uses an open signature format, so it is possible to create custom signatures to meet an organization�s specific security needs. Plus, NetScreen enables customers to create their own Stateful signatures. Using the signature editor, customers can significantly narrow down the pattern match to the service field of the protocol to reduce the chance for irrelevant pattern matching.

Regex supported when creating custom signatures?
Yes, NetScreen supports Regular Expression pattern matching and provides regular expressions in a drop down menu (next to the pattern field) within the signature editor to make it easer for a user to write effective Stateful signatures.

How are new vendor attack signatures obtained and deployed?
Registered customers under an IDP support contract will be notified of and have access to regular signature updates. Regular signature updates can include updated and new signatures, detailed descriptions and a migration, allowing customers the ability to decide how best to merge the new signatures with the existing signatures. The NetScreen-IDP signature update process is as easy as a virus update system. Updating signatures for all devices located anywhere on the network is very simple, since the signatures can be downloaded using the User Interface to the central management server and distributed to all sensors with one click. If you so desire, the system also provides granular control so you can decide which NetScreen signatures should be downloaded and which should not. In addition, if you modify a NetScreen provided signature, the system is intelligent enough to ask you which signature should be kept and which should be overwritten.  

Frequency of signature updates?
NetScreen provides signature updates on a regular basis, approximately once a week, but also releases emergency signature updates, if necessary, for critical threats soon after they are discovered.

What infrastructure does the vendor have behind the signature update process (i.e. dedicated team of engineers? How many? Does it have a name?)
NetScreen has a dedicated team of engineers, whose purpose is to identify and research vulnerabilities and develop attack signatures to combat them.

Can one signature update file be downloaded to the local network and used to update all IDS engines from a central location, or is it necessary to initiate a live connection to the Internet download server for each sensor/management server?
The IDP Signature update can be loaded in as a file, if the administrator does not wish to use automatic (live) network updates.

Can signature updates be scheduled and fully automated?
No, NetScreen sends alerts to notify administrators when new signatures, attack updates, are available. The update process, which is described above, is fairly automated, giving administrators the ability to do a complete update in a matter of minutes. But NetScreen also offers the flexibility to allow administrators to pick and choose the updates they want to meet the specific needs of the organisation, as well as containing automatic checks in it to make sure that custom signatures are not overridden without the administrator�s confirmation. As a result, the signature updates are easy to do, yet remain in the control of the administrator to ensure the system is always behaving as the organisation dictates.

Which network types are supported by the sensor?
          The NetScreen-IDP 10 supports 10/100 Fast Ethernet networks

          The NetScreen-IDP 100 supports 10/100 Fast Ethernet networks, optional Gigabit Fibre Ethernet cards and comes with a 1000-SX GBIC.

          The NetScreen-IDP 500 supports both 10/100 Fast Ethernet and Gigabit Fibre Ethernet standard and comes with a 1000-SX GBIC.

What network protocols are analysed?
NetScreen supports more than 50 protocols. Please see the table below:

What application-level protocols are analysed?
See the above table.

Can the product perform protocol decodes?
For every protocol that NetScreen-IDP supports, it performs full protocol decode.

Can the product perform protocol anomaly detection?
Yes, protocol anomaly detection is one of NetScreen-IDP�s eight detection mechanisms. Protocol anomaly detection, sometimes referred to as protocol analysis, is the ability to analyse packet flows (the uni-directional communication between two systems) to identify irregularities in the generally accepted Internet rules of communication. These rules are defined by open-protocols and published standards (RFC�s), as well as vendor-defined specifications for communication between networked devices. The objective is to implement an intrusion detection mechanism that identifies traffic that doesn�t meet specifications or violates the relevant standards. Once an irregularity is identified, it can be used to make network security decisions. This is very effective in detecting suspicious activity, such as a buffer-overflow attack.

Is the detection engine �stateful�? If so, please explain how this works.
Yes it is stateful. NetScreen-IDP�s Stateful Signatures identify attack patterns by utilising both Stateful Inspection and protocol analysis, which is performed as part of protocol anomaly detection. As a result, Stateful Signatures understand the context of each data byte and the state of the client and server at the time of transmission.  Stateful Signatures are compared to only relevant data bytes, according to the communication state to which each signature is relevant. In other words, Stateful Signatures only look for an attack in the state of the communication where that attack can cause damage, significantly improving performance and reducing false positives.

If Stateful - how many open connections can be tracked? Is this value configurable?
The maximum number of sessions (combination UDP, TCP, ICMP) that NetScreen-IDP can support varies by solution: 

          The NetScreen-IDP 10 supports a maximum of 10,000 Sessions

          The NetScreen-IDP 100 supports a maximum of 50,000 sessions

          The NetScreen-IDP 500 supports a maximum of 200,000 sessions. 

While these values can be modified by the Administrator on a per-sensor basis, the above is the default and represents the maximum recommended number of sessions for each solution.

If stateful - for how long are partially opened connections tracked? Is this configurable?
If the ACK response to the SYN-ACK is not received from the initiator within 30 seconds, the session is discarded.  We also allow the user to discard TCP sessions not setup by the proper 3-way handshake (SYN, SYN-ACK, ACK)

If stateful - for how long are fully opened connections tracked if not used? Is this configurable?
Established TCP sessions are maintained state for up to 1 hour of no traffic and then discarded. This is configurable in the policy under the Sensor Settings tab.

If stateful - explain the behaviour of the system when the state tables are filled
New sessions are discarded when the session table is full. We don't actively go through the session table and purge entries when the session limit is exceeded.    

Will the detection engine alert on ALL suspicious activity, or only when an attack is made against a vulnerable server? If so, please explain in detail how this works. Can this behaviour be modified (i.e. to alert on ALL attacks if required)?
Alerts on all suspicious activity as defined in the rule base. If required, per-seonsr rules allow the administrator to look for only IIS attacks against their IIS servers, so that they are not getting alerts on Apache attacks against their IIS servers that cannot do any damage.

Are server responses monitored and alerted upon?
Yes. NetScreen-IDP tracks both sides of the connection and we have signatures that trigger based on the servers response

(NSS COMMENT: enabling server-to-client response signatures has a significant impact on performance - NetScreen recommends these signatures are disabled in heavily-loaded networks, and they were turned off for our testing).

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)
Yes, NetScreen-IDP can monitor user-defined connections. The policy-based approach to IDP Management allows the administrator to setup a specific policy for specific source/destination pairs, with administrator-controlled actions.

Detect network-level packet based attacks?
Yes, NetScreen-IDP detects network-level packet-based attacks. Both IP Spoofing and Layer 2 (ARP) spoofing without any special configuration.

Detect all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
Yes, NetScreen IDP�s Traffic Anomaly Detection mechanism is designed to look for attacks over multiple connections, such as port scans and network scans.  It supports identifying and blocking excessive CONNECT, SYN Stealth Scans, FIN Stealth Scans and UDP Scans.

Detect SYN floods? Manual or automatic thresholds? Configurable?
NetScreen IDP uses its SYN-Protector to detect and prevent SYN-Floods. The connection rate thresholds for SYN-Flood detection are configurable in the Sensor Settings tab in the IDP GUI.  SYN-Flood Protector actually mimics the server�s SYN-ACK response until it is validated. As soon as it is determined that the connection is not a SYN-Flood the real connection to the server will be opened to the client. This eliminates any impact a SYN-Flood may have on servers protected with IDP.

Does the system perform packet/stream reassembly?
NetScreen-IDP performs reassembly, which reconstructs streams to interpret data exactly as the destination machine would interpret it. It also normalises the traffic, removing extraneous characters and alternate representations of data to ensure there is no ambiguity about what the packets contain. This can include packet de-fragmentation, removing overlapping packets, reordering packets for correct interpretation, etc. 

Perform deobfuscation?
Yes, see above.

List all �prevention� features available (TCP reset, ICMP unreachable, firewall reconfiguration, drop packets (in-line only))
NetScreen-IDP is capable of operating in-line if required to deliver true prevention, by dropping the malicious packet or connection during the attack detection process to stop attacks from ever reaching the target system. The administrator defines in the rulebase which attacks warrant a drop packet or drop connection action, preventing the attack from ever reaching its destination. Where passive detection is preferred, NetScreen can send TCP Resets in an attempt to tear down a connection.

Packet capture capabilities? Only the trigger packet, or before and after? How are packet captures stored/viewed?
Packet capture is configurable and defined in the rulebase. Customers can turn on logging and set how many packets before and after an attack they would like the system to capture. The packets are stored on the Sensor and accessed by the management server

Option to record entire sessions for �forensic� investigation? Where is this data stored? How is it secured from tampering?
No means to record an entire session automatically. Packet Captures are stored in a standard PCAP format on the IDP Sensor on an EXT3 file-system with standard UNIX permissions. They can be easily exported through the IDP GUI and viewed with any packet capture program, such as Ethereal, that can open PCAP files.  Packet captures are not cryptographically time stamped or authenticated.

Reporting from sensor to console - range of alert response options (detail these, i.e. log, alert, e-mail, pager, packet capture, etc)
NetScreen-IDP provides multiple methods for alerting of events. The standard alerting method includes alert icons on the user interface console (alarm), SNMP Trap messages, e-mail, and Syslog messages. In addition, custom script and programs may be invoked using the run script interface. This interface can be used to invoke paging programs or other custom notification programs, enabling the NetScreen-IDP to interface with many notification systems. Packet logging can be turned on and the administrator can define how many packets before and after that attack they would like to capture for forensic purposes. In the NetScreen-IDP Security Policy, each rule may have its own set of alerting mechanisms enabled

Can alert response options be set only at a global policy level, only at individual signature level, or to groups of signatures (or a mixture of all three)?
The alert response options are defined in the rule base at individual rule level. (NSS COMMENT: There is no provision to define responses at a group or global policy level)

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?
Yes, alerts are reported to the central console�s log viewer in real time, without the use of third party software. It can be used to immediately identify alerts, and it contains the ability to filter the data on any of the data-columns such as time, severity, attack type, source, and destination, etc� simply by right-clicking on the log viewer and selecting your filters.

Can alerts from all sensors be viewed at a single console at the same time (i.e. without having to connect to separate sensors from the console)?
NetScreen-IDP�s management automatically aggregates all logs/alerts from all of the Sensors and presents them in single log viewer.

Can the central console correlate alerts from multiple sensors (i.e. not just display alerts from multiple sensors, but attempt to infer a connection between different alerts on different sensors)?
NetScreen aggregates the information from all of the sensors and correlates it to identify overall trends. It then presents this information in a summary, dashboard view, to help organizations immediately see what is being attacked, who is attacking and what they are using. As a result, organisations can drill into the incidents that are of interest to them and quickly get to the specific logs associated with the event to understand what is going on and make swift security decisions to close out the incident. 

(NSS COMMENT: This is an aggregate and summarise capability only - there is no automatic correlation in the current version)

Can alerts be correlated manually by the administrator - grouped together in the database as a single event for further investigation?
This capability is not currently available in NetScreen-IDP.

Can alerts/events be annotated and tracked for investigation by multiple administrators/investigators?
Yes, the logs can be annotated and tracked for investigation by multiple users in several ways. There is a notes column that an administrator can write in to instruct, inform, update, etc. on an incident. There are configurable flags that the customer can define as they wish, for example, to identify different owners of incidents, criticalities, status, etc.

Does the software offer advice on preventative action to ensure the attack does not happen again?
For each alert, NetScreen provides links to standard external sources of reference information (CVE, etc)

What industry standards are supported - Intrusion Detection Exchange Format working group (IDWG), Intrusion Alert Protocol (IAP), Intrusion Detection Message Exchange Format (IDMEF), IDXP - and in what way?
NetScreen-IDP currently does not support this functionality.

Which third party event correlation systems are supported and in what way?
NetScreen-IDP currently does not support this functionality.

Integration with other scanning/IDS products?
NetScreen-IDP currently does not support this functionality.

Log file maintenance - automatic rotation, archiving, reporting from archived logs, etc.
Log files can be manually archived from the IDP Management Server.  A log file is created for each day and is automatically rotated.  Reporting can be performed on archived data by copying the archived data back to the IDP Management Server and executing a report.  Additionally NetScreen enables customers to export the IDP Logs into CSV format or Postgress SQL database for integration with their existing reporting systems.

Management reporting - range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
NetScreen-IDP provides nine different types of Executive Reports:

Top Scan Sources Logs by Flag
Top Scan Targets Attacks by Severity
Top Attacks Attacks over Time
Top Attackers Most Active Rules
Top Victims  

These reports can be customized for the range of log data to be graphed, data origin (the sensor which the data was taken from), the interface on which the data was received on (internal or external), the top X number to be graphed, and the graph type (pie or bar).  Following is an example of the Top Attacks Report.

The NetScreen-IDP also provides Investigative Reports for forensic analysis.  NetScreen�s Log Investigator provides the ability to see enterprise security at a high level and then drill down to specific threats and view them from various standpoints.  Customers can correlate the attacker and the victim against the types of attacks used against them, so the impact of attacks is immediately evident. The two axis of the report can be configured for different data.  In all, there are 15 permutations of the following axis:

Top Sources
Top Destination
Top Attack
Top Destination Port
Host Watch List
Source Watch List

From this top report, the user is able to drill down on any subset of data contained in the report, i.e. the 3rd axis of the report.  Also, it is possible to view the data in the log viewer.  In this case, a log view is automatically generated with the appropriate filters to show only the data selected in the Investigative Report.  Following is an example of the Investigative Report:

The customer can zoom in to see the details surrounding an individual cell, row or column to better understand your network threats.

Are trend/comparison reports available?
This capability is not currently available in NetScreen-IDP.

Does reporting allow customised filtering down to the level of reporting all activity on a specific network resource/object by a specific user/machine on a specific date?
The logs can be filtered to show the administrator the information they are looking for, so they could filter the logs to show traffic coming from a specific source address, going to a specific network resource on a specific date.

Report management - can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?
The management reports are canned reports that can be generated real time and then exported into HTML to be e-mailed or used outside of the system.

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector
Reports are currently generated with information from all IDP Sensors managed by a certain IDP Management Server. 

Ability to define custom reports?
This capability is not currently available in NetScreen-IDP. However one could export log information to CSV or a Posgres SQL Database for use with third-party reporting systems.

Provide brief description of any management software included in the base price of the product. 
NetScreen-IDP�s management server, with all of the features and benefits previously described, is included in the price of the solution, up to 10 sensors.

Provide brief description of any additional management products available as extra cost options. 
A nominal licensing fee is charged for NetScreen-IDP�s management to manage more than 10 sensors. The fees are based on 11-25 sensors, 25-100 sensors and more than a 100 sensors.

Documentation provided

NetScreen provides hard and soft copy documentation of the following: 

          NetScreen-IDP Concepts & Examples Guide (Hard Copy Book / PDF)

          NetScreen-IDP Users Guide (Hard Copy Book / PDF)

          NetScreen-IDP Quick Start Guide (Hard Copy  Pamphlet / PDF)

          Release Notes (Hard Copy  Pamphlet / PDF)

          Upgrade Notes - if applicable (Hard Copy Pamphlet / PDF)

          NetScreen-IDP Hardware Guide (Hard Copy Pamphlet / PDF)

          IDP FAQ  - Web site (Online / PDF Archives) 

How is the product licensed? How is the license enforced?
NetScreen-IDP is licensed per Sensor.  Three models of IDP Sensors are available depending on bandwidth and session capacities.  The management server is also licensed per Sensor; however it is included free of charge for up to 10 Sensors.

End user pricing information

NetScreen-IDP 10 US List Price $7,995

NetScreen-IDP 100 US List Price $16,495

NetScreen-IDP 500 US List Price $34,995

Ongoing cost of maintenance/updates

NetScreen-IDP 10 HW Maintenance/SW Subscription/Support US List Price $400/$1200/$800

NetScreen-IDP 100 HW Maintenance/SW Subscription/Support US List Price $825/2500/$1650

NetScreen-IDP 500 HW Maintenance/SW Subscription/Support US List Price $1750/$5250/$3500

Click here to return to the NetScreen Review
Click here to return to the IDS Index Section

Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.