Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 984

Table of Contents

Advertisement

Network and Security Manager Administration Guide
authentication users
runtime (external user group)................................403
timeout............................................................................393
automatic policy versioning..............................................510
AV
activating subscription on device..........................287
configuring in firewall rules......................................452
update pattern file......................................................298
AVT reports...................................................................784, 789
B
backdoor rulebase
about................................................................................482
adding to security policy............483, 488, 492, 495
backdoor rules
configuring.....................................................................482
configuring actions.....................................................485
configuring Match
columns.......................................484, 488, 492, 495
configuring notification..............485, 489, 493, 496
configuring operation................................................485
configuring services...............................484, 488, 493
configuring severity.....................486, 490, 494, 497
configuring source and
destination...........................................484, 488, 492
configuring zones........................................................484
backup interface, fail over.................................................303
BGP, peer connection troubleshooting.......................304
binary data objects...............................................................416
BSG transactions
voice policies
policy manager....................................................523
BugTraq references..............................................................343
byte range filter
setting..............................................................................745
C
Central Manager..................................................................603
certificate authorities...........................................................412
chart type, configuring........................................................797
Citrix client, custom.............................................................282
clusters
adding................................................................................151
configuring......................................................................232
configuring J Series......................................................233
configuring JUNOS......................................................233
configuring SRX Series..............................................233
editing the configuration...........................................232
IDP, adding......................................................................152
934
Infranet Controller, adding........................................152
Infranet Controller, importing..................................154
J Series, activating........................................................157
J Series, adding..............................................................155
J Series, importing........................................................156
J Series, modeling.........................................................157
JUNOS, activating.........................................................157
JUNOS, adding...............................................................155
JUNOS, importing.........................................................156
JUNOS, modeling..........................................................157
ScreenOS, adding.........................................................152
Secure Access, adding................................................152
Secure Access, importing..........................................154
SRX Series, activating.................................................157
SRX Series, adding.......................................................155
SRX Series, importing.................................................156
SRX Series, modeling..................................................157
vsys, adding....................................................................164
columns
filtering audit log entries...........................................764
filtering log entries.......................................................748
hiding................................................................................746
moving.............................................................................746
setting views..................................................................746
Combined port mode..........................................................106
Common Criteria EAL2 Compliance...............................45
Common Tasks pane.............................................................24
compound attack objects
custom............................................................................356
custom, adding protocol anomaly.......................358
custom, configuring attack pattern......................357
custom, configuring ordered match.....................358
custom, configuring scope.......................................357
configlet
creating............................................................................140
installing...........................................................................143
configuration data
viewing.............................................................................750
configuration files.................................................................238
configuration group value icon..........................................191
configuration groups
about.................................................................55, 188, 221
applying...........................................................................224
creating............................................................................222
deleting............................................................................227
editing...............................................................................223
excluding.........................................................................225
list entries.......................................................................224
ordered list entries, adding with.............................227
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents