Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 130

Table of Contents

Advertisement

Network and Security Manager Administration Guide
Table 16: Predefined NSM Administrator Activities (continued)
Function
Firewall Rulebases
Force Logout Administrators
Get Entitlement from
Entitlement Server
Group Expressions
GTP Objects
HA for guiSvrClusterMgr
Historical Log Reports
ICAP Objects
IDP
IDP Cluster Monitor
80
Task
Description
Create/Edit
The firewall rulebases (Zone and Global) in a security policy contain rules
that handle traffic passing through the firewall. These activities enable
View
an administrator to control or view rules in the firewall rulebases.
N/A
The Force Logout Administrators activity enables a system administrator
to forcibly log out another administrator when there is a resource
contention.
N/A
Entitles the administrator to configure devices to receive services that
require subscriptions, such as internal AV or Deep Inspection Signature
Service.
Create
Group expressions allow the system administrator to set conditions for
authentication requirements for external users stored on a RADIUS server.
Delete
Edit
View
Create
GPRS Tunneling Protocol (GTP) objects applied to a security policy rule
enable a security device to manage GTP traffic. If a GTP packet matches
Delete
the rule, the device attempts to further match the packet data with the
parameters set in the GTP object.
Edit
View
N/A
Enables the system administrator to configure HA parameters for the
GUI server.
View
A historical log report is a report generated using historical log entries. If
an administrator can view historical log reports, then that administrator
can also view shared historical log reports and their definitions.
Create
An ICAP object defines a server or server group to act as an ICAP AV
server.
Delete
Edit
View
Create
Enables a system manager to create, delete, edit, or view IDP devices.
Delete
Edit
View
View
Enables a system administrator to run the IDP Cluster Monitor and monitor
IDP clusters.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents