Viewing, Editing, And Deleting Binary Data Objects; Configuring Protected Resources - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Viewing, Editing, and Deleting Binary Data Objects

Configuring Protected Resources

Copyright © 2010, Juniper Networks, Inc.
To view binary data objects, from the Configure panel of the main navigation tree, select
Object Manager > Binary Data. The object manager lists each configured binary data
object, and provides the following information about each object:
The name given to the object for use in NSM.
The pathname to the file on the client UI device.
A comment provided by the administrator.
To edit a binary data object:
Double-click on the object in the Binary Data list. In the Binary Data dialog box, you
1.
can change the object name, the color of its icon, the comment, or the file on the
client UI device that the object references.
Click OK when you are done.
2.
To delete a binary data object, select the object in the Binary Data list and click the delete
icon.
A protected resource combines network components, network services, a traffic direction,
and the security devices that protect those components and services. Protected resources
are the source and destination addresses of a policy-based VPN.
Protected resources consist of the following elements:
IP Address—The address represents the computer, network, or range of addresses to
be considered part of this protected resource. The address can be an individual host,
a network, or an address group.
Network Service—Services are the protocols (HTTP, FTP) that communicate over a
network. The service can be an individual service or a service group.
Traffic Direction—Traffic direction is determined by the IP address that initiates the
connection:
Client connections are outgoing (outbound) from the protected network.
Server connection are incoming (inbound) to the protected network.
To protect incoming and outgoing traffic, select Both.
Security Device—The device that protects the network component and server. If the
resource can be reached through more than one device, add multiple devices to the
resource. When you add a protected resource to a VPN, the devices in the protected
resource are included in the VPN.
Each protected resource represents an address or a range of addresses on your network.
Each resource also can specify a service (such as FTP or NSF). Therefore, the protected
resource is the destination for all traffic using the selected service to the selected address.
Chapter 8: Configuring Objects
421

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents