Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 17

Table of Contents

Advertisement

Part 3
Chapter 8
Copyright © 2010, Juniper Networks, Inc.
Archiving and Restoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Archiving Logs and Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Restoring Logs and Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Downloading Schemas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Downloading Schemas Using the NSM UI . . . . . . . . . . . . . . . . . . . . . . . . 312
Downloading Schemas Using the GUI Server CLI . . . . . . . . . . . . . . . . . . 312
Applying a Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Managing
Configuring Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
About Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Using Objects Across Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Replacing Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Working with Unused Shared Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Searching for Unused Shared Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Deleting an Unused Shared Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Working with Object Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Searching For and Deleting Duplicate Objects . . . . . . . . . . . . . . . . . . . . . . . 322
Configuring Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Viewing Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Creating Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Adding a Host Address Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Adding a Network Address Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Editing and Deleting Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Replacing Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Adding an Address Object Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Adding a Multicast Group Address Object . . . . . . . . . . . . . . . . . . . . . . . 326
Adding Static DNS Host Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Blocked Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Configuring Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Viewing Predefined Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Creating Custom Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Editing and Deleting Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Configuring Schedule Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Creating Schedule Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Configuring Access Profile Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Configuring Quality of Service Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Creating a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Deleting a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Editing a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Working with DI Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Viewing Predefined DI Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Viewing Attack Version Information for Attack Objects . . . . . . . . . . . . . . . . 333
Viewing Predefined DI Attack Object Groups . . . . . . . . . . . . . . . . . . . . . . . . 334
Updating Predefined DI Attack Objects and Groups . . . . . . . . . . . . . . . . . . . 334
Creating DI Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Table of Contents
xvii

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents