Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 1014

Table of Contents

Advertisement

Network and Security Manager Administration Guide
list key parameters.....................................................208
maximum.......................................................................207
modifying values in......................................................197
overriding.........................................................................201
overview.............................................................................55
permissions......................................................................79
predefined entities.....................................................208
security policy................................................................441
setting priority...............................................................202
unsupported device options..........................202, 218
third-party host checker policies....................................277
time binding for custom attack object.........................347
time-based filter
setting .............................................................................760
timeline
logging..............................................................................755
timeout for authentication user......................................391
TLS................................................................................................22
toolbar in UI...............................................................................25
Top Alarms report.................................................................801
Top Attackers (DI) report...................................................819
Top Attackers (Screen) report..............................804, 818
Top Attacks (DI) report......................................................802
Top Attacks (Screen) report..................................803, 818
top axis, Log Investigator.....................................................771
Top Configuration Changes report..................................817
Top Configuration Logs report.........................................801
Top FW/VPN Rules report.................................................816
Top Information Logs report............................................802
Top Rules report...................................................................804
Top Self Logs report............................................................802
Top Targets (Screen) report..................................804, 818
Top Traffic Alarms report...................................................801
Top Traffic Log report..........................................................801
Traffic Anomalies Rulebase
other scans....................................................................495
session limiting............................................................496
TCP and UDP scans...................................................495
traffic device-specific views.............................................657
traffic distribution
by protocol, viewing...................................................660
by security policy, viewing........................................658
by VPN, viewing............................................................661
for device, viewing......................................................658
traffic log report....................................................................801
traffic shaping
about...............................................................................449
DSCP class selector...................................................450
mode................................................................................450
964
troubleshooting, sending commands to
device....................................................................................674
Trust-Untrust port mode...................................................105
Trust-Untrust-DMZ port mode........................................107
Trust/Untrust/DMZ (Extended) port mode...............108
tunnel interfaces
configuring for VPN....................................................558
configuring single for ScreenOS 5.x.....................565
tunnel zones
configuring.....................................................................558
U
UAC See Infranet Controller devices
UAC reports...........................................................................800
UDP header matches for custom attack
object....................................................................................353
Unified Access Control See Infranet Controller
devices
Unified Access Control (UAC) reports........................804
unreachable workflow
activating device...........................................................135
importing device............................................................118
updating attack object database...................................285
updating IDP engine.............................................................291
URL categories, permission to update on
system....................................................................................85
user authentication, configuring in firewall
rules.......................................................................................455
user flag See flag
user group objects, configuring in firewall
rules......................................................................................456
user objects
about...............................................................................399
configuring in firewall rules......................................456
external..........................................................................400
local..................................................................................399
using external user groups in VPNs.....................400
using MIPs as source or destination in firewall
rules......................................................................................444
V
validation icons......................................................................190
vendor specific attributes See VSAs
version of attack object database.................................289
Violation Viewer....................................................................709
VIPs
global objects................................................................410
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents