Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 994

Table of Contents

Advertisement

Network and Security Manager Administration Guide
DMZ-Dual-Untrust......................................................109
Dual-Untrust..................................................................106
Home-Work....................................................................105
Trust-Untrust.................................................................105
Trust-Untrust-DMZ......................................................107
Trust/Untrust/DMZ (Extended)............................108
port number range filter
setting..............................................................................745
port scanning..........................................................................491
pre/post rules..........................................................................515
predefined entities in templates....................................208
Predefined log views...........................................................733
predefined reports
generating........................................................................791
predefined views....................................................................731
preferred ID, configuring in firewall rules.....................449
prerules and postrules.........................................................515
preview tools.........................................................................250
primary interface, fail over................................................303
priority levels for traffic shaping.....................................446
Profiler
alerts................................................................................688
configuring.....................................................................686
configuring permitted objects................................693
context profiles............................................................687
customizing preferences..........................................689
data viewer..........................................................692, 693
filtering and sorting....................................................696
MAC/view area............................................................699
operations on devices without IDP rules...........689
setting up.......................................................................685
settings...........................................................................686
starting............................................................................689
stopping.........................................................................689
time intervals................................................................697
updating settings........................................................688
using.................................................................................683
profiler
using for keeping networks current.......................701
using for network baseline........................................701
using for stopping worms and trojans.................703
Profiler DB
accessing records in...................................................704
purging records............................................................700
Profiler reports.............................................................784, 789
Profiler views
about...............................................................................690
using.................................................................................696
protected resources....................................................417, 539
944
protocol anomaly attack objects, custom..................355
protocol distribution............................................................724
device-specific view, described..............................641
viewing............................................................................644
protocol filter
setting...............................................................................743
Protocol Profiler view..........................................................691
R
RADIUS
authentication of NSM users....................................68
authentication server example..............................398
authentication servers...............................................395
compatibility with RFC 2138...................................395
ranges........................................................................................744
rapid deployment
deploying many devices.............................................177
overview...............................................................................6
using..................................................................................138
RD See rapid deployment
re-importing devices...........................................................246
reachable workflow
activating device...........................................................132
importing device............................................................113
Realtime Monitor
about..................................................................................26
using.................................................................................633
views................................................................................634
Redundant Routing Engines
configuring.....................................................................234
refreshing DNS entries on devices..................................301
regional server object.........................................................605
reimporting devices...........................................42, 100, 506
reimporting policies............................................................506
reject action
changed to deny.........................................................500
configuring in firewall rules......................................443
rekey...........................................................................................557
remote authentication dial in user service See
RADIUS
remote settings....................................................................409
Report Manager
about..................................................................................26
using.................................................................................783
report time period, configuring........................................797
report types............................................................................783
reporting options on device
SNMP................................................................................725
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents