Searching For And Deleting Duplicate Objects; Configuring Address Objects - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Searching For and Deleting Duplicate Objects

Configuring Address Objects

322
These operations are described in the "Automatic Policy Versioning" on page 514.
When you create a new object from Object Manager, NSM displays a warning if a similar
custom object with same parameters already exists. You can use Object Manager to
search for and delete unused duplicate objects from a selected category.
To find and delete a duplicate object from a selected category:
From Object Manager, right-click on an object category, for example, Address Objects,
1.
Attack Objects or Service Objects, and select Search Duplicate Objects from the
menu.
The Search Duplicate Objects dialog box is displayed.
From the Shared Object Category List, select one or more categories that you want
2.
to search in the current domain for duplicate objects and click Next.
NSM displays the list of Unused Duplicate Objects.
From the list of Unused Duplicate Objects, select the objects you want to delete.
3.
NSM displays a message that the selected objects will be deleted and a warning
that the operation cannot be reversed.
NOTE: When you select a group of duplicate objects, such as an address group, NSM
displays the details of the fields that are common.
Click Next to delete the selected objects.
4.
NSM deletes the unused duplicate objects that you selected and displays a report
of the deleted objects.
Click Finish to exit.
5.
An address object is a representation of a component of your network, such as a
workstation, router, switch, subnetwork, or any other object that is connected to your
network. You use address objects in NSM to specify the network components you want
to protect:
Firewall and IDP Rules—Use address objects or groups to specify the source and
destination of network traffic
Multicast Rules—Use multicast group address objects to specify the destination of
multicast traffic.
VPNs—Use address objects or groups to create Protected Resources for your
Policy-Based and Mixed-Mode VPNs.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents