Disabling Rules (Nsm Procedure); Exporting Security Policies (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Configuring Intrusion Detection and Prevention Devices Guide

Disabling Rules (NSM Procedure)

Related Topics

Exporting Security Policies (NSM Procedure)

Related Topics
122
You can disable a rule without deleting it in cases where you run tuning experiments,
troubleshoot an issue, or otherwise need to make a quick or temporary modification.
To disable a rule, right-click inside the No. column (the first column) of the rule and select
Disable. The rule remains in the rulebase, but a gray diagonal stripe indicates that it has
been disabled. While the rule is disabled, NSM does not install the rule on any devices.
To enable a rule, right-click inside the No. column (the first column) of the rule and select
Disable again to clear the check box. You can disable rule groups using the same method.
For more information, see the Network and Security Manager Administration Guide.
NOTE: You cannot disable an entire security policy or a rulebase.
NSM and Intrusion Detection and Prevention Device Management Overview on page 5
Modifying IDP Rulebase Rules (NSM Procedure) on page 36
You can export a security policy rulebase to an HTML file.
To export a security policy to an HTML file:
Select the security policy and select File > Export Policy to display the Export Policy
1.
dialog box.
Select the rulebases you want to export.
2.
Select a directory in which to save the exported file.
3.
Click Export to complete the operation.
4.
Each export creates a new directory. The default directory name is
policyname_YYMMDD_HHMMSS. The export process puts each rulebase in a separate
HTML file in that directory.
Use an HTML browser to view the exported file. For more information, see the Network
and Security Manager Administration Guide.
Intrusion Detection and Prevention Devices and Security Policies Overview on page 31
Assigning a Security Policy in an Intrusion Detection and Prevention Device (NSM
Procedure) on page 117
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents