Extension Lists; Command Lists; Url Patterns - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.

Extension Lists

In an extension file list profile, you can specify various file extensions to be allowed or
blocked; for example, .txt, .pdf, .exe. You can use these list profiles to create antivirus
settings as well. The maximum number of characters allowed in an Extension name are
29, in an Extension entry 15, and an Extension list 255. The maximum number of user
defined Extension lists is system dependent. To create a new Extension list profile:
Select
Object Manager
1.
Predefined UTM Extension List Profiles on top and Custom UTM Extension List
Profiles below. You can only view but not edit the listed predefined profiles. You can
create and edit custom profiles.
Select
in the Custom UTM Extension List Profiles table. The
2.
+
window opens.
Profile
Enter a name for the profile.
3.
Enter a comment or description.
4.
Select a color from the drop-down list.
5.
Enter the extension types for the profile.
6.
Select
OK.
7.

Command Lists

A command list defines various commands to be executed in the system for different
protocols that you can permit or deny. You can create a new command list profile.
Select
Object Manager
1.
Select
+.
The
New Command List Profile
2.
Enter a name for the profile.
3.
Enter a comment or description.
4.
Select a color from the drop-down list.
5.
Enter the list of commands for the profile.
6.
Select
7.
OK.

URL Patterns

You can create a URL pattern by listing different URLs to be permitted or denied. To
create and view URL patterns:
Select
Object Manager
1.
and create a new URL pattern.
Select
The
+ .
New URL Pattern
2.
Enter a name for the profile.
3.
Enter a comment or description.
4.
>
>
>
UTM
Misc
Extension List.
>
>
>
UTM
Misc
Command List.
window opens.
>
UTM
>
Misc
>
URL Patterns.
window opens.
Chapter 8: Configuring Objects
NSM displays two tables:
New Extension List
You can view all the URL patterns
367

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents