Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 1004

Table of Contents

Advertisement

Network and Security Manager Administration Guide
setting a domain filter...............................................760
setting a flag filter........................................................759
setting a port number range filter..........................761
setting a port range filter...........................................761
setting a protocol filter..............................................759
setting a range filter....................................................760
setting a time-based filter.......................................760
setting an address filter.............................................759
setting an alert filter...................................................759
find utility.................................................................................758
firewall options......................................................................735
Firewall rule options...........................................................458
firewall rulebase
about................................................................................434
permissions.....................................................................80
rule groups.....................................................................436
firewall rules
about................................................................................434
configuring.....................................................................442
configuring actions.....................................................446
configuring address objects....................................444
configuring alerts..........................................................451
configuring antivirus...................................................456
configuring application relocation........................453
configuring authentication......................................455
configuring counting and alarms...........................451
configuring devices.....................................................447
configuring DI profile..................................................457
configuring GTP object.............................................449
configuring HA session backup..............................453
configuring logging and counting...........................451
configuring NAT...........................................................448
configuring preferred ID............................................453
configuring rule options............................................448
configuring rule title...................................................459
configuring scan manager.......................................456
configuring schedule..................................................452
configuring services...................................................446
configuring traffic shaping.......................................449
configuring Web filtering profile............................454
configuring zones........................................................443
deleting............................................................................510
deny action.....................................................................447
disabling..........................................................................510
negating source or destination..............................444
permit action................................................................446
reject action...................................................................447
reject action changed to deny...............................504
rule groups......................................................................510
954
using MIPs as source or destination....................444
VPN links.........................................................................435
VPN rules........................................................................435
Firewall/VPN reports..........................................................801
firmware, adjusting version on device..........................265
first packet context for custom attack object...........349
flag..............................................................................................792
flag filters
setting..............................................................................759
flow properties, viewing....................................................350
flow statistics.........................................................................740
device-specific view, described.............................658
viewing............................................................................666
FQDN..........................................................................................571
from object icon......................................................................191
FW/VPN reports.........................................................800, 801
G
group expressions
about...............................................................................404
configuring in firewall rules......................................456
group IKE ID.............................................................................557
group, device...........................................................................179
GTP
about................................................................................376
APN filter.........................................................................379
configuring in firewall rules.....................................449
filtering GTP-in-GTP packets..................................378
IMSI prefix filter............................................................380
limiting GTP message length..................................376
limiting GTP tunnels....................................................377
limiting GTP-C message rate...................................377
message filtering..........................................................381
removing inactive GTP tunnels...............................377
subscriber tracing (lawful interception)..............381
traffic counting.............................................................378
traffic logging................................................................378
validating sequence numbers.................................377
GUI Server
about.....................................................................................11
configuring for log exporting...................................786
permissions......................................................................84
processes...........................................................................12
guiSvrCLI.sh utility...............................................................808
H
HA session backup, configuring in firewall
rules.......................................................................................453
HA statistics, viewing..........................................................675
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents