Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 78

Table of Contents

Advertisement

Network and Security Manager Administration Guide
28
Templates—A partial device configuration that you can define once, and then use for
multiple devices.
Device Groups—A user-defined collection of devices.
Device Discovery Rules—Sets of rules that define subnets or ranges of IP addresses to
scan for EX Series devices in your network.
Topology Views— Graphic and tabular views of the network topology generated by
the topology discovery engine, providing device information as well.
Policy Manager
The Policy Manager manages security policies that contain the firewall, multicast, and
VPN rules that control traffic on your network for devices that support centralized policy
management. Using a graphical, easy-to-use rule building platform, you can quickly
create and deploy new policies to your security devices.
Use the Policy Manager to:
Add or modify existing security policies.
Add or modify existing VPN rules.
Add or modify existing IDP rules.
Create new policies based on existing policies.
Install policies on one or multiple devices.
Delete policies.
If the device configurations that you import from your security devices contain policies,
the Policy Manager displays those imported policies. For details on editing those imported
polices or creating new policies, see "Configuring Security Policies" on page 429, or
"Configuring VPNs" on page 543.
You can configure policies for ScreenOS and IDP devices using Policy Manager.For Secure
Access, Infranet Controller, and EX Series devices, you must configure policies in the
device. For J Series routers, SRX Series gateways, and MX Series routers, you can configure
policies either in the Central Policy Manager or in the device, but not both.
VPN Manager
The VPN Manager contains the VPN objects that control the VPN tunnels between your
managed devices and remote users. Using VPN objects, such as Protected Resources
and IKE Proposals, you can create multiple VPNs for use in your security policies.
Use the VPN Manager to:
Define the protected resources on your network—the network resources you want to
protect in a VPN.
Create custom IKE Phase 1 and 2 Proposals.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents