Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 995

Table of Contents

Advertisement

reports
Administrative..............................................................788
Attacks by Severity (DI)............................................786
Attacks by Severity (Screen)...................................787
Attacks over Time (DI)..............................................786
Attacks over Time (Screen)....................................788
AVT...................................................................................789
configuring options.....................................................796
configuring time period..............................................797
count-based..................................................................796
DI........................................................................................786
EX-Switch......................................................................790
FW/VPN..........................................................................785
Logs by User-set Flag.....................................788, 800
naming.............................................................................796
Profiler.............................................................................789
Screen..............................................................................787
SSL/VPN........................................................................789
time-based....................................................................796
Top Alarms.....................................................................785
Top Attackers (Screen).............................................788
Top Attacks (DI)..........................................................786
Top Attacks (Screen).................................................787
Top Configuration Changes ....................................801
Top Configuration Logs.............................................785
Top Information Logs.................................................786
Top Rules........................................................................788
Top Self Logs.................................................................786
Top Targets (Screen).................................................788
Top Traffic Alarms.......................................................785
Top Traffic Log..............................................................785
Unified Access Control (UAC)................................788
using to optimize rulebases....................................800
using to track incidents.............................................799
resource statistics
device-specific view, described.............................642
viewing............................................................................655
revocation checking.............................................................413
RFC 2138, RADIUS compatibility....................................395
role-based administration
about...................................................................................61
configuring.................................................................61, 66
creating administrators................................................67
creating roles....................................................................74
creating subdomains...................................................90
using effectively..............................................................63
using, enterprise organizations.................................63
using, service providers................................................65
Copyright © 2010, Juniper Networks, Inc.
roles
about...................................................................................74
assigning...........................................................................88
custom................................................................................74
dependant activities.....................................................75
permissions......................................................................75
root administrator, setting on device............................302
Routing Engine
configuring.....................................................................234
rule groups, about................................................................432
rule options, configuring in firewall rules....................444
rule shadowing.....................................................................499
rule title....................................................................................455
Rulebase
Exempt...........................................................................480
rulebases
about................................................................................428
permissions......................................................................83
rules
about...............................................................................430
duplication.....................................................................498
S
SA devices See Secure Access devices
scan manager, configuring in firewall rules................452
scans
detecting..........................................................................491
other scans.....................................................................491
port and network scans.............................................491
TCP and UDP scans....................................................491
schedule objects
about................................................................................332
configuring in firewall rules.....................................448
schema See device schema
Screen reports..............................................................784, 787
ScreenOS clusters, adding.................................................152
ScreenOS devices
activating with dynamic IP address......................135
activating with static IP address.............................132
adding clusters..............................................................152
configuring features of...............................................192
importing with dynamic IP address.......................118
importing with static IP address..............................113
rapid deployment.........................................................138
supported platforms......................................................13
ScreenOS firmware
adjusting version on device......................................267
upgrading.......................................................................264
ScreenOS policy name......................................................455
Index
945

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents