Redundant Routing Engines
configuring.....................................................................234
refreshing DNS entries on devices.................................299
regional server object..........................................................621
reimporting devices.............................................42, 100, 510
reimporting policies.............................................................510
reject action
changed to deny..........................................................504
configuring in firewall rules......................................447
rekey...........................................................................................573
remote authentication dial in user service See
RADIUS
remote settings.....................................................................407
Report Manager
about..................................................................................26
using.................................................................................799
report time period, configuring........................................813
report types............................................................................799
reporting options on device
SNMP.................................................................................741
reports
Administrative..............................................................804
Attacks by Severity (DI)............................................802
Attacks by Severity (Screen)..................................803
Attacks over Time (DI)..............................................802
Attacks over Time (Screen)...................................804
AVT...................................................................................805
configuring options......................................................812
configuring time period..............................................813
count-based...................................................................812
DI.......................................................................................802
EX-Switch......................................................................806
FW/VPN..........................................................................801
Logs by User-set Flag......................................804, 816
naming..............................................................................812
Profiler.............................................................................805
Screen.............................................................................803
SSL/VPN........................................................................805
time-based.....................................................................812
Top Alarms.....................................................................801
Top Attackers (Screen)............................................804
Top Attacks (DI)..........................................................802
Top Attacks (Screen)................................................803
Top Configuration Changes .....................................817
Top Configuration Logs..............................................801
Top Information Logs................................................802
Top Rules.......................................................................804
Top Self Logs................................................................802
Top Targets (Screen)................................................804
Copyright © 2010, Juniper Networks, Inc.
Top Traffic Alarms.......................................................801
Top Traffic Log..............................................................801
Unified Access Control (UAC)...............................804
using to optimize rulebases.....................................816
using to track incidents..............................................815
resource statistics
device-specific view, described.............................658
viewing..............................................................................671
revocation checking..............................................................417
RFC 2138, RADIUS compatibility....................................393
role-based administration
about...................................................................................61
configuring.................................................................61, 66
creating administrators................................................67
creating roles....................................................................74
creating subdomains...................................................90
using effectively..............................................................63
using, enterprise organizations.................................63
using, service providers................................................65
roles
about...................................................................................74
assigning...........................................................................88
custom................................................................................74
dependant activities.....................................................75
permissions......................................................................75
root administrator, setting on device...........................300
Routing Engine
configuring.....................................................................234
rule groups, about................................................................436
rule options, configuring in firewall rules....................448
rule shadowing......................................................................503
rule title....................................................................................459
Rulebase
Exempt............................................................................484
rulebases
about................................................................................432
permissions......................................................................83
rules
about................................................................................434
duplication.....................................................................502
S
SA devices See Secure Access devices
scan manager, configuring in firewall rules................456
scans
detecting........................................................................495
other scans....................................................................495
port and network scans............................................495
TCP and UDP scans...................................................495
Index
961
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers