Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 997

Table of Contents

Advertisement

importing.........................................................................156
modeling..........................................................................157
SRX Series devices
activating clusters.........................................................157
activating with dynamic IP address......................136
activating with static IP address............................134
adding clusters..............................................................155
adding multiple with discovery rules....................166
configuring......................................................................195
importing clusters........................................................156
importing with dynamic IP address.......................124
importing with static IP address..............................116
modeling clusters.........................................................157
supported platforms......................................................16
SSL VPN devices See Secure Access devices
SSL/UAC predefined log views.......................................732
SSL/VPN reports........................................................784, 789
SSP
for management connections...................................22
using to load firmware...............................................265
statistics
Ethernet...........................................................................724
flow....................................................................................724
policy................................................................................724
status bar...................................................................................25
storing log files......................................................................768
stream 256 context for custom attack object..........352
stream context for custom attack object...................352
sub-categories, logs.............................................................742
subdomains
about..........................................................................62, 90
permissions......................................................................84
subscriber tracing in GTP object....................................383
subscription, activating......................................................287
Sun Remote Procedure Call (Sun-RPC).....................385
supernet, using in VPN.......................................................550
support, technical See technical support
SurfControl
integrated in firewall rules.......................................450
redirect in firewall rules.............................................450
Web categories, predefined.....................................376
SYN-flood...............................................................................487
system device-specific views..........................................642
system statistics, viewing.................................................655
system status monitor, permission to view..................85
T
tailing logs................................................................................741
target platform for custom attack object...................344
Copyright © 2010, Juniper Networks, Inc.
TCP
handshake......................................................................487
TCP header matches for custom attack
object....................................................................................354
TCP session close notification........................................454
technical overview..................................................................10
technical support
contacting JTAC............................................................xlix
template
validating........................................................................202
template operations directive..........................................215
template value icon...............................................................191
templates..................................................................................101
about........................................................................187, 196
applying...........................................................................199
applying multiple templates...................................202
benefits............................................................................196
configuration groups, using with...........................228
creating............................................................................198
default values...............................................................208
device groups...............................................................208
example of......................................................................198
exporting.........................................................................220
importing........................................................................220
limitations.......................................................................207
list key parameters.....................................................208
maximum.......................................................................207
modifying values in......................................................197
overriding.........................................................................201
overview.............................................................................55
permissions......................................................................79
predefined entities.....................................................208
security policy...............................................................437
setting priority...............................................................202
unsupported device options..........................202, 218
third-party host checker policies....................................279
time binding for custom attack object........................349
time-based filter
setting .............................................................................744
timeline
logging.............................................................................739
timeout for authentication user.....................................393
TLS................................................................................................22
toolbar in UI...............................................................................25
Top Alarms report................................................................785
Top Attackers (DI) report..................................................803
Top Attackers (Screen) report..............................788, 802
Top Attacks (DI) report......................................................786
Top Attacks (Screen) report..................................787, 802
Index
947

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents