Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 1012

Table of Contents

Advertisement

Network and Security Manager Administration Guide
schedule objects
about................................................................................330
configuring in firewall rules......................................452
schema See device schema
Screen reports............................................................800, 803
ScreenOS clusters, adding.................................................152
ScreenOS devices
activating with dynamic IP address......................135
activating with static IP address.............................132
adding clusters..............................................................152
configuring features of...............................................192
importing with dynamic IP address.......................118
importing with static IP address..............................113
rapid deployment.........................................................138
supported platforms......................................................13
ScreenOS firmware
adjusting version on device.....................................265
upgrading........................................................................262
ScreenOS policy name......................................................459
SCTP
Objects............................................................................390
searching for logs by ID......................................................758
searching in UI
about...................................................................................33
locating IP addresses...................................................36
locating patterns at the beginning of a
string...............................................................................34
locating patterns within a string...............................34
using regular expressions............................................35
Secure Access clusters
adding...............................................................................152
importing.........................................................................154
Secure Access devices
adding clusters..............................................................152
configuring features of...............................................194
importing clusters........................................................154
importing with dynamic IP address........................121
supported platforms....................................................20
Security Explorer
exporting data to HTML.............................................727
permissions....................................................................725
using...................................................................................721
usingt................................................................................724
views..................................................................................721
Security Monitor
about...................................................................................27
using.................................................................................699
962
security policies....................................................................429
about........................................................................28, 430
assigning to a device...................................................501
changing rule order....................................................508
cut, copy, paste............................................................508
device policy pointers..................................................511
device-specific distribution.....................................657
exporting..........................................................................513
importing devices with inactive policies..............513
installing................................................................462, 476
managing........................................................................507
merging......................................................................56, 511
permissions......................................................................84
reimporting.....................................................................510
rule groups......................................................................510
rule shadowing.............................................................503
rulebases.........................................................................432
rules..................................................................................434
session rematch..........................................................505
templates........................................................................441
updating.........................................................................505
validating........................................................................502
validation tool...............................................................502
validation, rule duplication......................................502
validation, rule shadowing.......................................503
validation, unsupported options...........................504
validation, zone mismatch......................................502
security policy
editing rules...................................................................766
object versions..............................................................766
security policy distribution, viewing..............................658
self log entries........................................................................739
self logs.....................................................................................733
Server Manager
using.................................................................................687
Server Manager module........................................................31
service binding
selecting for custom attack object.......................343
supported services......................................................345
service objects
about................................................................................382
configuring in firewall rules.....................................446
custom............................................................................384
MS-RPC..........................................................................384
Sun-RPC.........................................................................383
session display filter
configuring......................................................................674
session filter
active sessions, viewing............................................673
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents