Network and Security Manager 2010.4 API Guide
26
When you configure a backdoor rule, you must specify the following:
Source and destination addresses for traffic that will be monitored
Services that are offered by the source or destination and any interactive services that
can be installed and used by attackers
For configuration procedures, see the NSM Online Help and the NSM Administrator's
Guide.
The data elements in the backdoor rulebase are illustrated and described in Figure 6 on
page 27 and Table 12 on page 27.
Copyright © 2010, Juniper Networks, Inc.
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1 and is the answer not in the manual?
Questions and answers