`Case 3:17-cv-05659-WHA Document 1-25 Filed 09/29/17 Page 1 of 4
`
`
`
`
`EXHIBIT 25
`EXHIBIT 25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Case 3:17-cv-05659-WHA Document 1-25 Filed 09/29/17 Page 2 of 4
`
`
`
`ÿÿ
`
`
`ÿÿ
`
`
`eh92+6ÿ5R0-/ÿ5/-9.71]ÿi7./-1+.5/-9.71]ÿi7./-1+.ÿWRR=7-017+2ÿj97X/
`
`*/-Qd7`.0.]e
`*+ÿ-./01/ÿ02ÿ345ÿ6782019./:
`;<ÿ5/=/-1ÿ>?@ABCDEÿGCB?@DHBÿIÿJK>ÿLMNMO?P?ND<
`*Q/ÿ345ÿ4+=7-7/6ÿR08/ÿ0RR/0.6ÿS71Qÿ0==ÿ345ÿR+=7-7/6<
`T<ÿU=7-VÿJK>ÿ>CONMDAB?<
`W==ÿ345ÿ6782019./6ÿ1Q01ÿ0./ÿX+S2=+0X/Xÿ0RR/0.6ÿ72ÿ1Q/ÿY7/SÿW==ÿ345ÿ5782019./6ÿR08/Zÿ06ÿ6Q+S2ÿ72ÿ[789./ÿ;<ÿ*Q76
`R08/ÿX76R=0]6ÿ1Q/ÿ^/.67+2ÿ+_ÿ1Q/ÿ6782019./ÿX010`06/<ÿ*Q/ÿ=/_1ÿR02/ÿX76R=0]6ÿ1Q/ÿX7a/./21ÿ-01/8+.7/6ÿ+_ÿ6782019./
`02Xÿ1Q/ÿ.78Q1ÿR02/ÿX76R=0]6ÿ1Q/ÿ6782019./6<
`
`b<ÿU=7-VÿcB?MD?ÿJK>ÿ>CONMDAB?<
`*Q/ÿU./01/ÿ345ÿ5782019./ÿR08/ÿ0RR/0.6Zÿ06ÿ6Q+S2ÿ72ÿ[789./ÿT<
`4./^7+96ÿ408/
`f/g1ÿ408/
`
`
`! "#
` $
`
`
`
`
`
`($
`
`
`
`
` )
`
`
`
`9/29/2017
`
`
`
`Case 3:17-cv-05659-WHA Document 1-25 Filed 09/29/17 Page 3 of 4
`Case 3:17-cVv-OS@0P8\didAaturb30TechiesDdourentatoneGupar2Guihiper Neages3 Of 4
`IPS Policy > IPS Signature > Create IPS Signature
`Create IPS Signature
`Maree:
`
`Action:
`
`fore
`
`all
`
`Cakegory:
`
`
`
`ÿÿ
`
`
`ÿÿ
`
`
`Eeywords
`Descriptions
`
`Severity nfo
`
`~
`
`Reld
`Binding:
`[Pp
`w
`Time Scope:
`a
`“atch fsurance:
`Protocok
`Time Count:
`Performance Dmpesct:
`*
`
`Add Signature
`
`Contest= stream
`
`Patterre
`
`-
`
`Direction: Client to Server
`
`~
`
`Regex:
`
`Seqgabed:
`
`4. Enter the nameof the signature in the Namefield.
`
`5. Enter the category of the signature in the Categoryfield.
`
`6. Enter a keywordin the Keywords field.
`
`7. Select the appropriate severity of the signature from the Severity drop-down menu.
`
`8. Select the appropriate action for the signature from the Action drop-down menu.
`
`9. Enter the description for this signature in the Description field.
`
`10. Select the Signature Details tab from the Pattern Set page. Enter the following:
`
`a. Select the appropriate option from the Attack Object Binding drop-down menu.
`
`b. Select the appropriate option from the Time Scope drop-down menu.
`
`c. Select the appropriate option from the Match Assurance drop-down menu.
`
`d. Enter the nameof the protocolin the Protocolfield.
`
`e. Enter the value of the time count in the Time Count field.
`
`f. Select the Performance Impact check box if you want to do so.
`
`g. Click the Add Signature button.
`
`h. Select the appropriate option from the Context drop-down menu.
`
`i. Select the appropriate direction from the Direction dropdowmn menu.
`
`j. Enter appropriate information in the Patternfield.
`
`k. Enter appropriate information in the Regexfield.
`
`Ll. Select the Negated check box if you want to do so.
`
`m. Select the Shellcode check box if you want to do so.
`
`n. Click the Add Anomaly button.
`
`(t)
`
`*+ÿ-./01ÿ/20ÿ.340ÿ56ÿ/20ÿ789.3/:10ÿ8.ÿ/20ÿ;340ÿ<0=>+
`?+ÿ-./01ÿ/20ÿ@3/0951Aÿ56ÿ/20ÿ789.3/:10ÿ8.ÿ/20ÿB3/0951Aÿ<0=>+
`C+ÿ-./01ÿ3ÿD0AE51>ÿ8.ÿ/20ÿF0AE51>7ÿ<0=>+
`G+ÿH0=0@/ÿ/20ÿ3II15I183/0ÿ70J018/Aÿ56ÿ/20ÿ789.3/:10ÿ6154ÿ/20ÿH0J018/Aÿ>15IK>5E.ÿ40.:+
`L+ÿH0=0@/ÿ/20ÿ3II15I183/0ÿ3@/85.ÿ651ÿ/20ÿ789.3/:10ÿ6154ÿ/20ÿM@/85.ÿ>15IK>5E.ÿ40.:+
`N+ÿ-./01ÿ/20ÿ>07@18I/85.ÿ651ÿ/287ÿ789.3/:10ÿ8.ÿ/20ÿO07@18I/85.ÿ<0=>+
`PQ+ÿH0=0@/ÿ/20ÿRSTUVWXYZÿ\ZWVS]^ÿ/3_ÿ6154ÿ/20ÿ`3//01.ÿH0/ÿI390+ÿ-./01ÿ/20ÿ65==5E8.9a
`3+ÿH0=0@/ÿ/20ÿ3II15I183/0ÿ5I/85.ÿ6154ÿ/20ÿM//3@Dÿb_c0@/ÿd8.>8.9ÿ>15IK>5E.ÿ40.:+
`_+ÿH0=0@/ÿ/20ÿ3II15I183/0ÿ5I/85.ÿ6154ÿ/20ÿe840ÿH@5I0ÿ>15IK>5E.ÿ40.:+
`@+ÿH0=0@/ÿ/20ÿ3II15I183/0ÿ5I/85.ÿ6154ÿ/20ÿf3/@2ÿM77:13.@0ÿ>15IK>5E.ÿ40.:+
`>+ÿ-./01ÿ/20ÿ.340ÿ56ÿ/20ÿI15/5@5=ÿ8.ÿ/20ÿ`15/5@5=ÿ<0=>+
`0+ÿ-./01ÿ/20ÿJ3=:0ÿ56ÿ/20ÿ/840ÿ@5:./ÿ8.ÿ/20ÿe840ÿB5:./ÿ<0=>+
`6+ÿH0=0@/ÿ/20ÿgZYhiYjVUkZÿljmVkWÿ@20@Dÿ_5nÿ86ÿA5:ÿE3./ÿ/5ÿ>5ÿ75+
`9+ÿB=8@Dÿ/20ÿoppÿRSTUVWXYZÿ_://5.+
`2+ÿH0=0@/ÿ/20ÿ3II15I183/0ÿ5I/85.ÿ6154ÿ/20ÿB5./0n/ÿ>15IK>5E.ÿ40.:+
`8+ÿH0=0@/ÿ/20ÿ3II15I183/0ÿ>810@/85.ÿ6154ÿ/20ÿO810@/85.ÿ>15I>5E4.ÿ40.:+
`c+ÿ-./01ÿ3II15I183/0ÿ8.65143/85.ÿ8.ÿ/20ÿ`3//01.ÿ<0=>+
`D+ÿ-./01ÿ3II15I183/0ÿ8.65143/85.ÿ8.ÿ/20ÿq090nÿ<0=>+
`=+ÿH0=0@/ÿ/20ÿrZTVWZpÿ@20@Dÿ_5nÿ86ÿA5:ÿE3./ÿ/5ÿ>5ÿ75+
`4+ÿH0=0@/ÿ/20ÿRsZ]]kipZÿ@20@Dÿ_5nÿ86ÿA5:ÿE3./ÿ/5ÿ>5ÿ75+
`.+ÿB=8@Dÿ/20ÿoppÿoUijV]tÿ_://5.+
`5+ÿH0=0@/ÿ/20ÿ3II15I183/0ÿ3.543=Aÿ6154ÿ/20ÿM.543=Aÿ>15IK>5E.ÿ40.:+
`PP+ÿB=8@Dÿ/20ÿRXmmiYWZpÿ\ZWZkWiY^ÿ_://5.ÿ/5ÿJ80Eÿ/20ÿ>07@18I/517ÿ/23/ÿ310ÿ7:II51/0>ÿE8/2ÿ/287ÿ789.3/:10+
``10J85:7ÿ`390
`;0n/ÿ`390
`
`
`! "#
` $
`
`
`
`
`
`($
`
`
`
`
`o. Select the appropriate anomaly from the Anomaly drop-down menu.
`
`Tl. Click the Supported Detectc
`
`Previous Page
`
`Next Page
`
`https://www.juniper.net/documentation/en_US/junos-space15.1/topics/task/operational/junos-space-security-design-ips-signature-creating.html
`
`2/3
`
` )
`
`
`
`Case 3:17-cv-05659-WHA Document 1-25 Filed 09/29/17 Page 4 of 4
`Case 3:17-cVv-OS@0P8\4idMaturb30TechiesDdoumentatoneGupar2Guihiper Neages4 Of 4
`
`
`
`ÿÿ
`
`
`ÿÿ
`
`
`9/29/2017
`12. Click Save.
`
`
`*+,ÿ./012ÿ3456,
`7890:;9<ÿ+=*>?=@?=A
`
`Modified: 2015-09-07
`
`EH;I08JKÿEFG;
`B;CDÿEFG;
`
`
`! "#
` $
`
`
`
`
`
`($
`
`
`
`
`https://www.juniper.net/documentation/en_US/junos-space15.1/topics/task/operational/junos-space-security-design-ips-signature-creating.html
`
`Previous Page
`
`Next Page
`
`3/3
`
`) )
`
`