Configuring Objects - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Schedule objects represent time periods and determine when a rule is in effect.
Service objects represent predefined and custom network services, such as HTTP/80.
Quality of Service profiles (IP Precedence and DSCP profiles) determine the quality
of service for an incoming packet in the network.
Shared Stream Control Transmission Protocol (SCTP) objects support protocols
such as IUA, SUA, M2UA, M3UA, and so on, and can be applied to policies.
Border Signaling Gateway (BSG) objects allow you to specify the egress-service-point
in a transaction term's route action. You can specify the device, the gateway in the
device, and a service point for every BSG service point object.
BSG Admission Controllers control SIP dialogs and transactions. They are defined
per gateway and referenced from transaction policies.
Application layer protection:
DI Profiles define the attack signature patterns, protocol anomalies, and the action
you want a security device to take against matching traffic.
AV Profiles define the server that contains your virus definitions and antivirus software.
Web Filtering Profiles define the URLs, the Web categories, and the action you want
a security device to take against matching traffic.
Users and authentication:
User objects represent RAS users on your network.
Authentication Servers represent the servers in your network used to authenticate
NSM administrators, RAS users, and network traffic.
Group Expressions define logical expressions used to include or exclude RAS users.
Certificates:
Certificate Authority objects represent the certificate authority's certificate.
CRL objects represent the certificate authority's certificate revocation list.
VoIP protection:
GTP objects represent client GTP configurations.
Extranet policies and custom policy fields:
Extranet Policy objects define rules and actions that you may apply to certain traffic
on an extranet device (third-party router).
Custom Policy Field objects represent metadata information that you can store and
use in a structured manner.
Use VPN Manager to view and configure the following objects:
Chapter 8: Configuring Objects
321

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents