overriding values in.....................................................226
reverting to values in..................................................226
sharing across multiple devices.............................228
templates, using with.................................................228
validating........................................................................224
wildcards, using with..................................................224
configuration logs report...................................................785
configuration states.............................................................247
configuration summary, running............................251, 254
Configure panel........................................................................27
configuring
ACVPN............................................................................600
logging.......................................................................713, 717
monitoring...........................................................633, 683
reporting..........................................................................783
TACACS Authentication Server.............................400
VPNs.................................................................................527
configuring in rule.................................................................455
configuring objects...............................................................319
connection states.................................................................247
connections, BGP peer......................................................304
counting, configuring in firewall rules...........................447
CRLs (certificate revocation list)....................................415
custom applications.............................................................331
custom Citrix client..............................................................282
custom log views..................................................................733
custom reports
creating.............................................................................791
deleting............................................................................792
organizing........................................................................792
custom sign-in pages..........................................................276
customer support..................................................................xlix
contacting JTAC............................................................xlix
CVE references......................................................................343
D
Dashboard
using.................................................................................683
Data Model
defined............................................................................306
importing........................................................................309
updating..........................................................................307
data model, defined.............................................................813
data origination icons..........................................................190
data point count, configuring.................................756, 797
data types................................................................................755
Deep Inspection
activating subscription on device..........................287
attack objects, custom.............................................340
Copyright © 2010, Juniper Networks, Inc.
checking attack object database...........................291
local attack object update.......................................288
profiles in firewall rules.............................................453
profiles, about...............................................................335
updating attack object database..........................287
default values in templates.............................................208
delta configuration summary.................................251, 254
deny action, configuring in firewall rules.....................443
dependant activities..............................................................75
destination NAT, configuring in firewall rules............445
device certificates, permissions........................................78
device configuration
about................................................................................186
importing...........................................................................112
link from Log Viewer...................................................750
memory optimization.................................................189
modeling.........................................................................130
permissions...............................................................78, 79
promoting to template.............................................200
unsupported in UI.........................................................193
updating..........................................................................254
device connection
modifying.........................................................................193
to NSM..............................................................................193
device delta config, permission to view.........................78
Device Edit dialog
EX Series devices.........................................................189
IDP devices.....................................................................190
Infranet Controller devices.......................................189
J Series devices.............................................................189
ScreenOS devices........................................................190
Secure Access devices...............................................189
Device Editor
about.................................................................................187
device firmware
adjusting version..........................................................267
permission to update....................................................78
device groups
adding..............................................................................180
permissions......................................................................79
planning for..............................................................55, 179
using...................................................................................179
device inventory
comparing........................................................................271
reconciling......................................................................270
viewing.............................................................................270
device log cleanup................................................................767
device log comments, permission to update...............78
device log flags, permission to update...........................78
Index
935
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers