Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 1000

Table of Contents

Advertisement

Network and Security Manager Administration Guide
timeout.............................................................................391
types.................................................................................393
authentication users
runtime (external user group).................................401
timeout.............................................................................391
automatic policy versioning..............................................514
AV
activating subscription on device.........................285
configuring in firewall rules......................................456
update pattern file......................................................296
AVT reports.................................................................800, 805
B
backdoor rulebase
about...............................................................................486
adding to security policy............487, 492, 496, 499
backdoor rules
configuring.....................................................................486
configuring actions.....................................................489
configuring Match
columns......................................488, 492, 496, 499
configuring notification..............489, 493, 497, 500
configuring operation................................................489
configuring services................................488, 492, 497
configuring severity......................490, 494, 498, 501
configuring source and
destination...........................................488, 492, 496
configuring zones........................................................488
backup interface, fail over..................................................301
BGP, peer connection troubleshooting........................302
binary data objects..............................................................420
BSG transactions
voice policies
policy manager....................................................527
BugTraq references...............................................................341
byte range filter
setting...............................................................................761
C
Central Manager....................................................................619
certificate authorities..........................................................416
chart type, configuring........................................................813
Citrix client, custom............................................................280
clusters
adding................................................................................151
configuring......................................................................232
configuring J Series......................................................233
configuring Junos.........................................................233
configuring SRX Series..............................................233
950
editing the configuration...........................................232
IDP, adding......................................................................152
Infranet Controller, adding........................................152
Infranet Controller, importing..................................154
J Series, activating........................................................157
J Series, adding..............................................................155
J Series, importing........................................................156
J Series, modeling.........................................................157
Junos, activating............................................................157
Junos, adding.................................................................155
Junos, importing...........................................................156
Junos, modeling.............................................................157
ScreenOS, adding.........................................................152
Secure Access, adding................................................152
Secure Access, importing..........................................154
SRX Series, activating.................................................157
SRX Series, adding.......................................................155
SRX Series, importing.................................................156
SRX Series, modeling..................................................157
vsys, adding....................................................................164
columns
filtering audit log entries...........................................780
filtering log entries.......................................................764
hiding................................................................................762
moving.............................................................................762
setting views..................................................................762
Combined port mode..........................................................106
Common Criteria EAL2 Compliance...............................45
Common Tasks pane.............................................................24
compound attack objects
custom............................................................................354
custom, adding protocol anomaly.......................356
custom, configuring attack pattern......................355
custom, configuring ordered match.....................356
custom, configuring scope.......................................355
configlet
creating............................................................................140
installing...........................................................................143
configuration data
viewing.............................................................................766
configuration files.................................................................237
configuration group value icon..........................................191
configuration groups
about.................................................................55, 188, 221
applying...........................................................................224
creating............................................................................222
deleting............................................................................227
editing...............................................................................223
excluding.........................................................................225
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents