Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 132

Table of Contents

Advertisement

Network and Security Manager Administration Guide
Table 16: Predefined NSM Administrator Activities (continued)
Function
Multicast Rulebases
NAT Objects and subtree
Network Honeypot Rulebase
NSRP Monitor
Permitted Objects
Phase1/Phase2 Proposal
Policy Custom Field Data
Objects
Policy Custom Field Metadata
Objects
Policy Lookup Table
82
Task
Description
Create/Edit
The multicast rulebase in a security policy contains multicast rules, which
can handle IGMP and PIM-SM traffic. These activities enable an
View
administrator to control or view rules in the multicast rulebase.
Create
Allows an administrator to manage NAT objects, which allow multiple
devices to share a single object.
Delete
Edit
View
Create
Allows an administrator to configure network honeypot rules that mimic
seemingly vulnerable counterfeit ports to entrap would be attackers.
Edit
View
View
NSRP Monitor tracks NSRP statistics. To enable NSM to track these
statistics, you must enable "NSRP Monitor" in the NSRP properties for
each cluster device.
Create
Allows an administrator to manage permitted objects. You configure
permitted objects in Profiler consisting of source ID, destination, and
Delete
service. These objects define what you should see on the network, rather
than using attack objects which define what you do not want to see.
Edit
View
Create
Allows an administrator to manage custom IKE phase 1 and phase 2
proposals,
Delete
Edit
View
Create
Allows an administrator to manage custom objects added to a Policy
table.
Delete
Edit
View
Create
Allows an administrator to manage metadata used in defining custom
Policy objects.
Delete
Edit
View
Modify
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents