Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 17

Table of Contents

Advertisement

Part 3
Chapter 8
Copyright © 2010, Juniper Networks, Inc.
Archiving and Restoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Archiving Logs and Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Restoring Logs and Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Downloading Schemas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Downloading Schemas Using the NSM UI . . . . . . . . . . . . . . . . . . . . . . . 314
Downloading Schemas Using the GUI Server CLI . . . . . . . . . . . . . . . . . . 314
Applying a Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Managing
Configuring Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
About Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Using Objects Across Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Replacing Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Working with Unused Shared Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Searching for Unused Shared Objects . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Deleting an Unused Shared Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Working with Object Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Searching For and Deleting Duplicate Objects . . . . . . . . . . . . . . . . . . . . . . . 324
Configuring Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Viewing Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Creating Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Adding a Host Address Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Adding a Network Address Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Editing and Deleting Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Replacing Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Adding an Address Object Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Adding a Multicast Group Address Object . . . . . . . . . . . . . . . . . . . . . . . 328
Adding Static DNS Host Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Blocked Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Configuring Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Viewing Predefined Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Creating Custom Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Editing and Deleting Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Configuring Schedule Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Creating Schedule Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Configuring Access Profile Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Configuring Quality of Service Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Creating a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Deleting a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Editing a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Working with DI Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Viewing Predefined DI Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Viewing Attack Version Information for Attack Objects . . . . . . . . . . . . . . . . 335
Viewing Predefined DI Attack Object Groups . . . . . . . . . . . . . . . . . . . . . . . . 336
Updating Predefined DI Attack Objects and Groups . . . . . . . . . . . . . . . . . . . 336
Creating DI Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Table of Contents
xvii

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents