Table 120: Unmanaged Commands For Firewall/Vpn Devices; Appendix B Unmanaged Screenos Commands - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

APPENDIX B
Unmanaged ScreenOS Commands
Copyright © 2010, Juniper Networks, Inc.
Network and Security Manager (NSM) is designed for system-level management, enabling
multiple administrators to manage their devices from one central location using the
majority of CLI commands available in ScreenOS. However, a small number of device
commands are unmanaged from the NSM UI.
Most unmanaged commands are useful only when performing device administration on
a specific device, and do not affect management capabilities (although future versions
of NSM may support these commands). To use an unmanaged device command, you
must connect locally to the Juniper Networks security device.
Table 120 on page 849 details each unmanaged command.

Table 120: Unmanaged Commands for Firewall/VPN Devices

common-criteria
envar
gate
ike
intervlan-traffic
This command disable all internal commands. Only the
root administrator can set this command. If someone other
than the root administrator tries to set this command, the
security device displays an error message.
These commands define environment variables. Security
devices use environment variables to make special
configurations at startup.
This command checks the number of gates on a security
device, how many are in use, and how many are still
available. Gates are logical access points in the firewall
for FTP and similar applications. Security devices create
the gates, then convert a gate for each new session when
data traffic occurs.
These commands define the Phase 1 and Phase 2
proposals and the gateway for an AutoKey IKE (Internet
Key Exchange) VPN tunnel, and specify other IKE
parameters.
These commands configure inter-VLAN traffic through a
security device. It is possible to configure a virtual system
(vsys) with two trusted interfaces, such that traffic can
enter the vsys through one interface and exit through the
other without undergoing any security services such as
authentication or encryption. This is known as inter-VLAN
traffic.
849

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents