Configuring Service Objects; Viewing Predefined Services - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Configuring Service Objects

Viewing Predefined Services

382
For Traffic Counters, select Count by Message.
Select Basic for the following message types: Log Forwarded Packets, Log Dropped
Packet Due to Type/Length/Version, and Log Dropped Packet Due to Invalid State.
Leave all other defaults.
In the GTP navigation tree, select IMSI Prefix and APN Filtering. Click the Add icon
4.
to display a new IMSI Prefix and APN Filter Entry dialog box. Configure the following,
then click OK:
For APN, enter mobiphone.com.mnc123.mcc456.gprs.
Select MCC-MNC and enter the code 24656.
For Selection Mode, select Mobile Station, Network, and Verified.
In the GTP navigation tree, select Subscriber Tracing.
5.
For Maximum Number of Simultaneous Active Traces, enter 2.
For Number of Bytes to Be Saved to Log, enter 1020.
Click the Add icon to display a New Subscriber ID dialog box. Configure the following,
6.
then click OK:
For ID, enter 345678.
For ID Type, select Based on IMSI.
Click OK to save the new Subscriber ID, then click OK to save the GPRS1 object.
7.
Service objects represent the IP traffic types for existing protocol standards. Security
devices monitor and manage network traffic using these protocols. NSM includes
predefined service objects for most standard services. You can also create custom service
objects to represent services that are not included in the list of predefined service objects,
or to represent a custom service running on your network.
You use service objects to create protected resources and specify the type of service
within a security policy:
In a protected resource, select a service or group of services to define the types of traffic
you are permitting to and from the resource.
In individual rules within a firewall or IDP rulebase, select one or more services or groups
of services to define the types of IP traffic to which the rule applies. The action of the
rule applies when the security device detects packets that use the specified service
type.
You can view predefined services in a tree or table format. The Service Tree displays
services in a tree format, with service groups and individual services. The Service Table
39 on page 383 displays services in a table format, and includes the following details:
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents