Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 1010

Table of Contents

Advertisement

Network and Security Manager Administration Guide
P
packet context......................................................................349
packet data
managing in logs..........................................................743
viewing in logs...............................................................745
pattern file, updating on device......................................296
perfect forward secrecy.....................................................424
permit action, configuring in firewall rules.................446
policies
Junos NAT........................................................................531
security policies..............................................................511
policy name, ScreenOS.....................................................459
policy statistics.....................................................................740
policy validation tool..........................................................502
policy version..........................................................................514
polymorphic objects............................................................522
port mode
about................................................................................104
changing.............................................................................111
Combined.......................................................................106
DMZ-Dual-Untrust......................................................109
Dual-Untrust..................................................................106
Home-Work....................................................................105
Trust-Untrust.................................................................105
Trust-Untrust-DMZ......................................................107
Trust/Untrust/DMZ (Extended)............................108
port number range filter
setting...............................................................................761
port scanning.........................................................................495
pre/post rules.........................................................................519
predefined entities in templates....................................208
Predefined log views...........................................................749
predefined reports
generating......................................................................807
predefined views...................................................................747
preferred ID, configuring in firewall rules.....................453
prerules and postrules........................................................519
preview tools..........................................................................248
primary interface, fail over.................................................301
priority levels for traffic shaping.....................................450
Profiler
alerts................................................................................704
configuring.....................................................................702
configuring permitted objects................................709
context profiles.............................................................703
customizing preferences..........................................705
data viewer..........................................................708, 709
filtering and sorting......................................................712
MAC/view area..............................................................715
960
operations on devices without IDP rules............705
setting up.........................................................................701
settings............................................................................702
starting............................................................................705
stopping..........................................................................705
time intervals..................................................................713
updating settings........................................................704
using.................................................................................699
profiler
using for keeping networks current........................717
using for network baseline.........................................717
using for stopping worms and trojans..................719
Profiler DB
accessing records in....................................................720
purging records..............................................................716
Profiler reports...........................................................800, 805
Profiler views
about................................................................................706
using...................................................................................712
protected resources....................................................421, 555
protocol anomaly attack objects, custom..................353
protocol distribution...........................................................740
device-specific view, described.............................657
viewing............................................................................660
protocol filter
setting..............................................................................759
Protocol Profiler view..........................................................707
R
RADIUS
authentication of NSM users....................................68
authentication server example..............................396
authentication servers...............................................393
compatibility with RFC 2138...................................393
ranges.......................................................................................760
rapid deployment
deploying many devices.............................................177
overview...............................................................................6
using..................................................................................138
RD See rapid deployment
re-importing devices...........................................................244
reachable workflow
activating device...........................................................132
importing device............................................................113
Realtime Monitor
about..................................................................................26
using.................................................................................649
views................................................................................650
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents