Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 988

Table of Contents

Advertisement

Network and Security Manager Administration Guide
firewall rules
about...............................................................................430
configuring.....................................................................438
configuring actions.....................................................442
configuring address objects...................................440
configuring alerts.........................................................447
configuring antivirus...................................................452
configuring application relocation........................449
configuring authentication.......................................451
configuring counting and alarms...........................447
configuring devices.....................................................443
configuring DI profile..................................................453
configuring GTP object.............................................445
configuring HA session backup.............................449
configuring logging and counting..........................447
configuring NAT...........................................................444
configuring preferred ID............................................449
configuring rule options............................................444
configuring rule title....................................................455
configuring scan manager.......................................452
configuring schedule.................................................448
configuring services....................................................442
configuring traffic shaping.......................................445
configuring Web filtering profile............................450
configuring zones........................................................439
deleting...........................................................................506
deny action....................................................................443
disabling.........................................................................506
negating source or destination..............................440
permit action.................................................................442
reject action...................................................................443
reject action changed to deny...............................500
rule groups.....................................................................506
using MIPs as source or destination....................440
VPN links..........................................................................431
VPN rules.........................................................................431
Firewall/VPN reports..........................................................785
firmware, adjusting version on device..........................267
first packet context for custom attack object............351
flag..............................................................................................776
flag filters
setting...............................................................................743
flow properties, viewing.....................................................352
flow statistics.........................................................................724
device-specific view, described.............................642
viewing............................................................................650
FQDN........................................................................................555
from object icon......................................................................191
FW/VPN reports..........................................................784, 785
938
G
group expressions
about...............................................................................406
configuring in firewall rules......................................452
group IKE ID.............................................................................541
group, device...........................................................................179
GTP
about................................................................................378
APN filter.........................................................................381
configuring in firewall rules......................................445
filtering GTP-in-GTP packets.................................380
IMSI prefix filter............................................................382
limiting GTP message length..................................378
limiting GTP tunnels...................................................379
limiting GTP-C message rate..................................379
message filtering.........................................................383
removing inactive GTP tunnels..............................379
subscriber tracing (lawful interception).............383
traffic counting............................................................380
traffic logging...............................................................380
validating sequence numbers.................................379
GUI Server
about.....................................................................................11
configuring for log exporting....................................770
permissions......................................................................84
processes...........................................................................12
guiSvrCLI.sh utility................................................................792
H
HA session backup, configuring in firewall
rules......................................................................................449
HA statistics, viewing.........................................................659
high availability
device-specific views, described...........................642
statistics.........................................................................659
historical reports, permissions..........................................80
Home-Work port mode......................................................105
host checker policies...........................................................279
hosted Java applets.............................................................281
I
ICMP
header properties........................................................355
icons
configuration group value..........................................191
error....................................................................................191
from object......................................................................191
override..............................................................................191
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents