Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 133

Table of Contents

Advertisement

Table 16: Predefined NSM Administrator Activities (continued)
Function
Polymorphic Address Objects
Polymorphic Service Objects
Post Domain Policies
Pre Domain Policies
Profiler
Profiler Data
Remote Settings
Routing Instance Object
Rulebases
Run Online Retention
Command
Security Explorer
Copyright © 2010, Juniper Networks, Inc.
Task
Description
Create
Allows an administrator to create polymorphic address objects.
Polymorphic objects can be used as place holders for values that will be
defined in a different context (in a regional server domain or subdomain,
for instance).
Create
Allows an administrator to create polymorphic service objects.
Polymorphic objects can be used as place holders for values that will be
defined in a different context (in a regional server domain or subdomain,
for instance).
Edit
Allows an administrator to edit post domain policy.
Edit
Allows an administrator to edit pre domain policy.
View
Enables an administrator to view the Profiler.
Purge
Enables an administrator to purge or clear data in the ProfilerDB.
Clear
Create
Allows an administrator to manage a remote settings object that defines
the DNS and WINS servers that are assigned to L2TP RAS users after
Delete
they have connected to the L2TP tunnel. You can use remote settings
objects in an L2TP VPN, and when configuring a local user on a specific
Edit
device.
View
Create
Use a routing instance object to share routing instances in the Radius
server & LDAP server configurations within the access profile object. A
Delete
routing instance object is a polymorphic object (similar to zone objects)
that maintains the mapping between the actual routing instance and the
Edit
device in which it is created.
View
Delete
A rulebase in a security policy contains rules that manage specific types
of traffic passing through the managed device. These activities enable
an administrator to delete a rulebase.
N/A
View
Allows an administrator to run the Security Explorer—a graphical tool
that enables you to visualize and correlate network behavior based on
data collected in the Profiler, Log Viewer, and Report Manager.
Chapter 3: Configuring Role-Based Administration
83

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents