custom attacks, extended information...............343
custom attacks, external references....................343
custom attacks, name and description..............342
custom attacks, protocol anomaly......................344
custom attacks, signature.......................................344
custom attacks, target platform...........................344
custom compound attacks.....................................356
custom compound attacks, adding
members....................................................................358
custom compound attacks, attack
pattern.........................................................................357
custom compound attacks, ordered
match..........................................................................358
custom compound attacks, scope........................357
custom protocol anomalies....................................355
custom signature attack objects, attack
context.........................................................................351
custom signature attacks.........................................345
custom signature attacks, attack
direction......................................................................352
custom signature attacks, attack flow................352
custom signature attacks, attack header
matches......................................................................352
custom signature attacks, attack pattern.........349
custom signature attacks, attack pattern
syntax..........................................................................350
custom signature attacks, false positive
setting..........................................................................345
custom signature attacks, first packet
context.........................................................................351
custom signature attacks, IP header
matches......................................................................353
custom signature attacks, IP protocol and
type..............................................................................346
custom signature attacks, line context...............352
custom signature attacks, packet context.........351
custom signature attacks, service
binding........................................................................345
custom signature attacks, stream 256
context........................................................................352
custom signature attacks, stream
context........................................................................352
custom signature attacks, supported
services........................................................................347
custom signature attacks, TCP header
matches......................................................................354
custom signature attacks, time binding.............349
custom signature attacks, UDP header
matches......................................................................355
Copyright © 2010, Juniper Networks, Inc.
deleting............................................................................324
DI profiles........................................................................336
DIP, global........................................................................411
group expressions......................................................406
group expressions, configuring..............................406
GTP...................................................................................378
IKE proposals.................................................................419
IP pools...........................................................................405
MIP, global.......................................................................412
NAT.....................................................................................411
predefined attacks......................................................335
protected resources.....................................................417
remote settings...........................................................409
replacing..........................................................................322
schedules........................................................................332
service groups...............................................................387
service objects in firewall rules..............................442
services...........................................................................384
services, adding...........................................................386
services, custom..........................................................386
URL predefined categories.......................................376
users..................................................................................401
users, external..............................................................402
users, local......................................................................401
VIP, global........................................................................412
ordered lists....................................................................210, 227
OS fingerprinting
enabling..........................................................................687
override icon.............................................................................191
P
packet context........................................................................351
packet data
managing in logs...........................................................727
viewing in logs...............................................................729
pattern file, updating on device......................................298
perfect forward secrecy.....................................................420
permit action, configuring in firewall rules.................442
policies
security policies............................................................507
policy name, ScreenOS.....................................................455
policy statistics......................................................................724
policy validation tool..........................................................498
policy version..........................................................................510
polymorphic objects............................................................518
port mode
about................................................................................104
changing.............................................................................111
Combined.......................................................................106
Index
943
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers