Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 1001

Table of Contents

Advertisement

list entries.......................................................................224
ordered list entries, adding with.............................227
overriding values in.....................................................226
reverting to values in..................................................226
sharing across multiple devices.............................228
templates, using with.................................................228
validating........................................................................224
wildcards, using with..................................................224
configuration logs report....................................................801
configuration states.............................................................245
configuration summary, running...........................249, 252
Configure panel........................................................................27
configuring
ACVPN..............................................................................616
destination NAT object..............................................414
Junos NAT policy...........................................................531
Junos OS NAT object....................................................411
legacy NAT object.......................................................409
logging....................................................................729, 733
monitoring...........................................................649, 699
NAT objects...................................................................409
reporting.........................................................................799
source NAT object.........................................................411
TACACS Authentication Server.............................398
VPNs.................................................................................543
configuring in rule.................................................................459
configuring objects................................................................317
connection states.................................................................245
connections, BGP peer.......................................................302
counting, configuring in firewall rules............................451
CRLs (certificate revocation list)....................................418
custom applications...........................................................329
custom Citrix client.............................................................280
custom log views..................................................................749
custom reports
creating...........................................................................807
deleting...........................................................................808
organizing......................................................................808
custom sign-in pages..........................................................274
customer support..................................................................xlix
contacting JTAC............................................................xlix
CVE references.......................................................................341
D
Dashboard
using.................................................................................699
Copyright © 2010, Juniper Networks, Inc.
Data Model
defined............................................................................304
importing........................................................................307
updating.........................................................................305
data model, defined...........................................................829
data origination icons..........................................................190
data point count, configuring..................................772, 813
data types.................................................................................771
Deep Inspection
activating subscription on device.........................285
attack objects, custom..............................................338
checking attack object database..........................289
local attack object update.......................................286
profiles in firewall rules..............................................457
profiles, about...............................................................333
updating attack object database..........................285
default values in templates.............................................208
delta configuration summary................................249, 252
deny action, configuring in firewall rules.....................447
dependant activities..............................................................75
destination NAT object.......................................................414
destination NAT policy.......................................................535
destination NAT, configuring in firewall rules............449
device certificates, permissions........................................78
device configuration
about................................................................................186
importing...........................................................................112
link from Log Viewer...................................................766
memory optimization.................................................189
modeling.........................................................................130
permissions...............................................................78, 79
promoting to template.............................................200
unsupported in UI.........................................................193
updating..........................................................................252
device connection
modifying.........................................................................193
to NSM..............................................................................193
device delta config, permission to view.........................78
Device Edit dialog
EX Series devices.........................................................189
IDP devices.....................................................................190
Infranet Controller devices.......................................189
J Series devices.............................................................189
ScreenOS devices........................................................190
Secure Access devices...............................................189
Device Editor
about.................................................................................187
Index
951

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents