Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 37

Table of Contents

Advertisement

List of Figures
Part 1
Chapter 1
Chapter 2
Chapter 3
Part 2
Chapter 4
Copyright © 2010, Juniper Networks, Inc.
Getting Started with NSM
Introduction to Network and Security Manager . . . . . . . . . . . . . . . . . . . . . . . . . 3
Figure 1: NSM Network Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Figure 2: NSM System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Figure 3: Overview of the User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Figure 4: UI Search Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Figure 5: "Contains String" Search Mode Example . . . . . . . . . . . . . . . . . . . . . . . . . 34
Figure 6: "Starts With" Search Mode Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Figure 7: "Regular Expression" Search Mode Details . . . . . . . . . . . . . . . . . . . . . . . . 35
Figure 8: "Regular Expression" Search Mode Example . . . . . . . . . . . . . . . . . . . . . . 36
Figure 9: "IP Address" Search Mode Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Figure 10: Exact String Search Mode Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Planning Your Virtual Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Figure 11: Selecting the GUI Server in Central Manager . . . . . . . . . . . . . . . . . . . . . . 58
Figure 12: Setting Up an Information Banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Figure 13: Information Banner Login into Central Manager . . . . . . . . . . . . . . . . . . . 59
Configuring Role-Based Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Figure 14: Creating Custom Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Figure 15: User in Domain "global" with a Predefined Role . . . . . . . . . . . . . . . . . . . 71
Figure 17: User in Subdomain "d1" With a Predefined Role . . . . . . . . . . . . . . . . . . . 72
Integrating
Adding Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Figure 25: Trust-Untrust Port Mode Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Figure 26: Home-Work Port Mode Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Figure 27: Dual-Untrust Port Mode Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Figure 28: Combined Port Mode Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Figure 29: Trust-Untrust-DMZ Port Mode Bindings . . . . . . . . . . . . . . . . . . . . . . . 108
Figure 30: Extended Port-Mode Interface to Zone Bindings . . . . . . . . . . . . . . . . . 108
Figure 31: DMZ Dual Untrust Port Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
xxxvii

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents