Index - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Index

A
Abstract Data Model..........................................................304
Access Point Name See APN
Action Manager
about....................................................................................31
actions, configuring in firewall rules.............................446
active sessions
information available.................................................672
session display filter...................................................674
session filter...................................................................673
viewing.............................................................................672
active statistics
about...............................................................................658
viewing..............................................................................671
active VPN
details, viewing.............................................................682
information, viewing..................................................663
activities See administrator activities
Adding the APE Rulebase.................................................476
Adding the Exempt Rulebase.........................................484
address filter
setting..............................................................................759
address objects
about................................................................................322
configuring in firewall rules.....................................444
address shifting See NAT-dst, and NAT-src
address spoofing, defined................................................823
Administer panel......................................................................31
Administrative reports............................................800, 804
administrator activities
action attributes.............................................................75
address objects...............................................................75
administrator roles.........................................................75
administrators.................................................................75
allow pre/post rules.......................................................75
antivirus profiles.............................................................76
attack update..................................................................76
audit logs...........................................................................76
auditable activities........................................................76
authentication server....................................................76
Copyright © 2010, Juniper Networks, Inc.
AV pattern.........................................................................76
backdoor rulebase.........................................................76
blocked IP..........................................................................76
CA.........................................................................................76
catalog objects................................................................76
channel...............................................................................77
CLI-based reports...........................................................77
CLI-based security update..........................................77
config sync status...........................................................77
configlet..............................................................................77
CRLs.....................................................................................77
custom troubleshoot commands............................77
dashboard.........................................................................77
database versions...........................................................77
deep inspection pack selection.................................77
device administrators....................................................77
device BGP operations.................................................78
device certificates..........................................................78
device configuration......................................................78
device CPU limit.............................................................78
device delta config.........................................................78
device firmware..............................................................78
device log comments...................................................78
device log flags................................................................78
device logs........................................................................78
device passwords...........................................................78
device reboot...................................................................78
device running config....................................................79
device site survey...........................................................79
device software keys.....................................................79
device status monitor...................................................79
device to/from file.........................................................78
device Web categories.................................................79
devices, groups, templates.........................................79
DI objects...........................................................................79
extranet policy objects.................................................79
failover device..................................................................79
firewall rulebases..........................................................80
force logout administrators.......................................80
get entitlement from entitlement server.............80
group expressions.........................................................80
947

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents