Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 127

Table of Contents

Advertisement

Table 16: Predefined NSM Administrator Activities (continued)
Function
Channel
CLI-based Reports
CLI-based Security Update
Config Sync Status
Configlet
CRLs
Custom Troubleshoot
Commands
Dashboard
Database Versions
Deep Inspection Pack
Selection
Device Admins
Copyright © 2010, Juniper Networks, Inc.
Task
Description
View
N/A
This activity enables an administrator to generate predefined and shared
historical log reports using the guiSvrCli command utility.
N/A
This activity enables an administrator to update the attack object
database on the NSM system using guiSvrCli command utility.
Check
Verifies the configuration status of the device.
View
A configlet is a small, static configuration file that contains information
on how a security device can connect to NSM.
Create
A Certificate Revocation List (CRL) identifies invalid certificates. You can
obtain a CRL file (
Delete
CA certificate for the device, and then use this file to create a Certificate
Revocation List object.
Edit
View
Edit
Enables add, delete, or viewing of custom troubleshooting commands
available through the Device Manager for troubleshooting devices. Custom
View
troubleshooting commands are in addition to the standard device
troubleshooting commands debug, exec, and get.
View
Known targets and sources of attacks or suspected targets and sources
of attacks can be added to source or destination watch lists. The
Dashboard is a near-real time monitor of watch lists of known targets
and sources of attacks and the top 10 attacks within the previous hour.
Create
These activities allow an administrator to manage the database snapshot
feature that provides versioning of NSM objects, policies, and managed
Delete
devices.
Edit
View
Edit
Deep Inspection is a mechanism for filtering traffic that a security device
permits. You can enable Deep Inspection in firewall rules to examine
View
permitted traffic and take specific actions if the DI module finds matching
attack signatures or protocol anomalies.
This activity enables a system administrator to view or set the deep
inspection package that is loaded on the device.
Import
Device administrators have permissions to administer the devices through
the CLI or UI for the device itself. Importing a device administrator allows
that administrator to use the NSM UI.
Chapter 3: Configuring Role-Based Administration
) from the CA that issued the local certification and
.crl
77

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents