Adding Binary Data Objects; Viewing, Editing, And Deleting Binary Data Objects; Configuring Protected Resources - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Adding Binary Data Objects

Viewing, Editing, and Deleting Binary Data Objects

Configuring Protected Resources

Copyright © 2010, Juniper Networks, Inc.
upload them to NSM, and how to link to them from to include them in a device object
configuration.
Before creating the object in the Object Manager, you must copy the file from its source
to the file system of your client UI device:
In the Configure panel of the NSM main navigation tree, select Object Manager >
1.
Binary Data.
Click the Add icon. In the New Binary Data dialog box, give the object a name, select
2.
a color for the icon, add an optional comment, and select the binary file that the
object will reference by navigating to it in the client UI file system.
Click OK to add the object to the Binary Data list in the Object Manager.
3.
To view binary data objects, from the Configure panel of the main navigation tree, select
Object Manager > Binary Data. The object manager lists each configured binary data
object, and provides the following information about each object:
The name given to the object for use in NSM.
The pathname to the file on the client UI device.
A comment provided by the administrator.
To edit a binary data object:
Double-click on the object in the Binary Data list. In the Binary Data dialog box, you
1.
can change the object name, the color of its icon, the comment, or the file on the
client UI device that the object references.
Click OK when you are done.
2.
To delete a binary data object, select the object in the Binary Data list and click the delete
icon.
A protected resource combines network components, network services, a traffic direction,
and the security devices that protect those components and services. Protected resources
are the source and destination addresses of a policy-based VPN.
Protected resources consist of the following elements:
IP Address—The address represents the computer, network, or range of addresses to
be considered part of this protected resource. The address can be an individual host,
a network, or an address group.
Network Service—Services are the protocols (HTTP, FTP) that communicate over a
network. The service can be an individual service or a service group.
Chapter 8: Configuring Objects
417

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents