Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 129

Table of Contents

Advertisement

Table 16: Predefined NSM Administrator Activities (continued)
Function
Device Running Config
Device Site Survey
Device Software Keys
Device Status Monitor
Device UrlCategory
Devices, Device Groups, and
Templates
DI Objects
Extranet Policy Objects
Dial-in Objects
Failover Device
Copyright © 2010, Juniper Networks, Inc.
Task
Description
View
A device running config is a report that details the device configuration
running on the physical device.
N/A
When setting up the NetScreen-5GT Wireless (ADSL) device as a wireless
access point (WAP), this activity enables an administrator to scan the
broadcast vicinity to see if there are any other WAPs broadcasting nearby.
Install
A device software key provides, enhances, or adds functionality for a
managed device.
View
The device status monitor tracks the status of devices, VPN tunnels, and
NSRP.
Update
The device URL category list contains predefined Web categories used
in Web filtering profiles. You can update the device Web category list
from the system Web category list.
View
A device is a managed device.
Create
A device group is a collection of managed devices.
Edit
A template is a device configuration that contains predefined, static
configuration information, such as networking settings, interface settings,
Delete
or DNS settings.
Create
Deep Inspection (DI) attack objects contain attack patterns and protocol
anomalies for known attacks and unknown attacks that attackers can
Delete
use to compromise your network. However, DI attack objects don't work
on their own—they need to be part of an attack object group and a DI
Edit
Profile object before you can use them in a firewall rule to detect known
attacks and prevent malicious traffic from entering your network.
View
Create
Extranet policies enable you to configure and manage third-party routers.
Delete
Edit
View
Create
Use Dial-in objects to dial-in and manage a device as a console. You can
create and edit lists of allowed numbers and lists of blocked numbers
Delete
and set a policy for unknown CNIDs.
Edit
View
N/A
Use failover to enable the device to switch traffic from the primary
interface to the backup interface, and from the backup to the primary
when both primary and backup interfaces are bound to the Untrust zone.
Chapter 3: Configuring Role-Based Administration
79

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents