Configure Modules - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Security Monitor
Security Monitor provides access to the Dashboard, Profiler, and Security Explorer. These
tools enable you to track, correlate, and visualize aspects about your internal network,
enabling you to create more effective security policies and minimize unnecessary log
records. For more details, see "Analyzing Your Network" on page 683.
The Security Monitor applies to ScreenOS devices and IDP sensors. It does not apply to
J Series, SRX Series, Secure Access, Infranet Controller, M Series, MX Series, or EX Series
devices.
Audit Log Viewer
The Audit Log Viewer contains a log entry for every change made by an NSM administrator.
For more details on Audit Log Viewer, see "Using the Audit Log Viewer" on page 762.

Configure Modules

The Configure panel include the following top-level modules:
Device Manager on page 27
Policy Manager on page 28
VPN Manager on page 28
UAC Manager on page 29
Object Manager on page 29
Device Manager
The Device Manager contains the device objects that represent your managed devices.
You can create or modify:
ScreenOS security devices and IDP sensors—The devices you use to enable access to
your network and to protect your network against malicious traffic.
Devices running JUNOS Software:
EX Series Ethernet Switches—Enterprise-class switches managed by NSM.
J Series Services Routers—Routers managed by NSM.
SRX Series Services Gateways.
M Series Multiservice Edge Routers and MX Series Ethernet Services Routers.
Secure Access products—SSL VPN systems managed by NSM.
Infranet Controller products—Unified Access control systems managed by NSM.
Vsys devices—Virtual devices that exists within a physical security device.
Clusters—Two managed devices joined together in a high availability configuration to
ensure continued network uptime.
Vsys cluster—A vsys device that has a cluster as its root device.
Extranet devices—Firewalls or VPN devices that are not Juniper Networks security
devices.
Chapter 1: Introduction to Network and Security Manager
27

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents