Chapter 8 Configuring Objects - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

CHAPTER 8
Configuring Objects
Copyright © 2010, Juniper Networks, Inc.
Objects represent reusable information, such as network addresses, individual users and
user groups, and commonly used configuration data. In Network and Security Manager
(NSM), objects are shared between the global domain and all subdomains.
Objects are the building blocks of the NSM management system. You can use an object
multiple times in the same domain. For example, you can create an address object to
represent a host such as an individual workstation, then use the address object in a VPN
protected resource and as the source or destination in a firewall or multicast rule.
This chapter contains the following sections:
About Objects on page 320
Configuring Address Objects on page 324
Configuring Application Objects on page 330
Configuring Schedule Objects on page 332
Configuring Access Profile Objects on page 332
Configuring Quality of Service Profiles on page 333
Working with DI Attack Objects on page 335
Working with IDP Attack Objects on page 338
Configuring Custom DI and IDP Attack Objects on page 340
Creating Custom DI Attack Groups on page 359
Creating Custom IDP Attack Groups on page 359
Unified Threat Management on page 364
Configuring Custom Policy Fields on page 376
Configuring GTP Objects on page 378
Configuring Service Objects on page 384
Configuring SCTP Objects on page 392
Configuring Authentication Servers on page 392
Configuring User Objects on page 401
Configuring VLAN Objects on page 405
Configuring IP Pools on page 405
319

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents