Index
A
Abstract Data Model..........................................................306
Access Point Name See APN
Action Manager
about....................................................................................31
actions, configuring in firewall rules..............................442
active sessions
information available................................................656
session display filter...................................................658
session filter...................................................................657
viewing............................................................................656
active statistics
about................................................................................642
viewing............................................................................655
active VPN
details, viewing............................................................666
information, viewing...................................................647
activities See administrator activities
Adding the APE Rulebase..................................................472
Adding the Exempt Rulebase.........................................480
address filter
setting...............................................................................743
address objects
about................................................................................324
configuring in firewall rules.....................................440
address shifting See NAT-dst, and NAT-src
address spoofing, defined................................................807
Administer panel......................................................................31
Administrative reports..............................................784, 788
administrator activities
action attributes.............................................................75
address objects...............................................................75
administrator roles.........................................................75
administrators.................................................................75
allow pre/post rules.......................................................75
antivirus profiles.............................................................76
attack update..................................................................76
audit logs...........................................................................76
auditable activities........................................................76
authentication server....................................................76
Copyright © 2010, Juniper Networks, Inc.
AV pattern.........................................................................76
backdoor rulebase.........................................................76
blocked IP..........................................................................76
CA.........................................................................................76
catalog objects................................................................76
channel...............................................................................77
CLI-based reports...........................................................77
CLI-based security update..........................................77
config sync status...........................................................77
configlet..............................................................................77
CRLs.....................................................................................77
custom troubleshoot commands............................77
dashboard.........................................................................77
database versions...........................................................77
deep inspection pack selection.................................77
device administrators....................................................77
device BGP operations.................................................78
device certificates..........................................................78
device configuration......................................................78
device CPU limit.............................................................78
device delta config.........................................................78
device firmware..............................................................78
device log comments...................................................78
device log flags................................................................78
device logs........................................................................78
device passwords...........................................................78
device reboot...................................................................78
device running config....................................................79
device site survey...........................................................79
device software keys.....................................................79
device status monitor...................................................79
device to/from file.........................................................78
device Web categories.................................................79
devices, groups, templates.........................................79
DI objects...........................................................................79
extranet policy objects.................................................79
failover device..................................................................79
firewall rulebases..........................................................80
force logout administrators.......................................80
get entitlement from entitlement server.............80
group expressions.........................................................80
931
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers