Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 998

Table of Contents

Advertisement

Network and Security Manager Administration Guide
top axis, Log Investigator...................................................755
Top Configuration Changes report.................................801
Top Configuration Logs report.........................................785
Top FW/VPN Rules report...............................................800
Top Information Logs report............................................786
Top Rules report...................................................................788
Top Self Logs report............................................................786
Top Targets (Screen) report..................................788, 802
Top Traffic Alarms report..................................................785
Top Traffic Log report.........................................................785
Traffic Anomalies Rulebase
other scans.....................................................................491
session limiting.............................................................492
TCP and UDP scans....................................................491
traffic device-specific views.............................................641
traffic distribution
by protocol, viewing...................................................644
by security policy, viewing........................................642
by VPN, viewing...........................................................645
for device, viewing.......................................................642
traffic log report....................................................................785
traffic shaping
about................................................................................445
DSCP class selector...................................................446
mode................................................................................446
troubleshooting, sending commands to
device...................................................................................658
Trust-Untrust port mode...................................................105
Trust-Untrust-DMZ port mode........................................107
Trust/Untrust/DMZ (Extended) port mode...............108
tunnel interfaces
configuring for VPN.....................................................542
configuring single for ScreenOS 5.x.....................549
tunnel zones
configuring.....................................................................542
U
UAC See Infranet Controller devices
UAC reports............................................................................784
UDP header matches for custom attack
object....................................................................................355
Unified Access Control See Infranet Controller
devices
Unified Access Control (UAC) reports.........................788
unreachable workflow
activating device...........................................................135
importing device............................................................118
updating attack object database...................................287
updating IDP engine............................................................293
948
URL categories, permission to update on
system....................................................................................85
user authentication, configuring in firewall
rules........................................................................................451
user flag See flag
user group objects, configuring in firewall
rules.......................................................................................452
user objects
about................................................................................401
configuring in firewall rules......................................452
external...........................................................................402
local...................................................................................401
using external user groups in VPNs......................402
using MIPs as source or destination in firewall
rules......................................................................................440
V
validation icons......................................................................190
vendor specific attributes See VSAs
version of attack object database..................................291
Violation Viewer....................................................................693
VIPs
global objects................................................................412
virtual chassis
activating with dynamic IP address......................136
activating with static IP address............................134
importing with dynamic IP address.......................124
importing with static IP address..............................116
virtual security devices See VSD
virtual workspace wallpaper image.............................280
virus pattern file, updating on device...........................298
VPN links, in firewall rules..................................................431
VPN Manager
about........................................................................28, 528
adding policy-based members.............................546
adding RAS users........................................................548
adding routing-based members...........................548
adding the VPN............................................................545
adding the VPN link...................................................560
autogenerating VPN rules........................................558
configuring ASN1-DN.................................................555
configuring FQDN........................................................555
configuring gateway...................................................552
configuring gateway security..................................554
configuring gateway, heartbeats...........................553
configuring gateway, mode.....................................552
configuring gateway, NAT Traversal.....................553
configuring IKE IDs......................................................555
configuring IKE properties........................................556
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents