Chapter 8 Configuring Objects - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

CHAPTER 8
Configuring Objects
Copyright © 2010, Juniper Networks, Inc.
Objects represent reusable information, such as network addresses, individual users and
user groups, and commonly used configuration data. In Network and Security Manager
(NSM), objects are shared between the global domain and all subdomains.
Objects are the building blocks of the NSM management system. You can use an object
multiple times in the same domain. For example, you can create an address object to
represent a host such as an individual workstation, then use the address object in a VPN
protected resource and as the source or destination in a firewall or multicast rule.
This chapter contains the following sections:
About Objects on page 318
Configuring Address Objects on page 322
Configuring Application Objects on page 328
Configuring Schedule Objects on page 330
Configuring Access Profile Objects on page 330
Configuring Quality of Service Profiles on page 331
Working with DI Attack Objects on page 333
Working with IDP Attack Objects on page 336
Configuring Custom DI and IDP Attack Objects on page 338
Creating Custom DI Attack Groups on page 357
Creating Custom IDP Attack Groups on page 357
Unified Threat Management on page 362
Configuring Custom Policy Fields on page 374
Configuring GTP Objects on page 376
Configuring Service Objects on page 382
Configuring SCTP Objects on page 390
Configuring Authentication Servers on page 390
Configuring User Objects on page 399
Configuring VLAN Objects on page 403
Configuring IP Pools on page 403
317

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents