Configuration Statements; Security Configuration Statement Hierarchy; Chapter 11 Configuration Statements - Juniper Junos OS Getting Started Manual

For branch srx series
Hide thumbs Also See for Junos OS:
Table of Contents

Advertisement

CHAPTER 11

Configuration Statements

Security Configuration Statement Hierarchy

Copyright © 2016, Juniper Networks, Inc.
Security Configuration Statement Hierarchy on page 75
[edit security address-book] Hierarchy Level on page 76
[edit security idp] Hierarchy Level on page 77
[edit security ike] Hierarchy Level on page 87
[edit security ipsec] Hierarchy Level on page 88
[edit security nat] Hierarchy Level on page 90
[edit security policies] Hierarchy Level on page 93
[edit security utm] Hierarchy Level on page 98
[edit security zones] Hierarchy Level on page 105
Use the statements in the
security
dynamic virtual private networks (VPNs), firewall authentication, flow, forwarding options,
group VPNs, Intrusion Detection Prevention (IDP), Internet Key Exchange (IKE), Internet
Protocol Security (IPsec), logging, Network Address Translation (NAT), public key
infrastructure (PKI), policies, resource manager, rules, screens, secure shell known hosts,
trace options, user identification, Unified Threat Management (UTM), and zones.
Statements that are exclusive to the SRX Series devices running Junos OS are described
in this section.
Each of the following topics lists the statements at a sub-hierarchy of the
hierarchy.
[edit security address-book] Hierarchy Level on page 76
[edit security alarms] Hierarchy Level
[edit security alg] Hierarchy Level
[edit security analysis] Hierarchy Level
[edit security application-firewall] Hierarchy Level
[edit security application-tracking] Hierarchy Level
[edit security certificates] Hierarchy Level
configuration hierarchy to configure actions, certificates,
[edit security]
75

Advertisement

Table of Contents
loading

Table of Contents