Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 998

Table of Contents

Advertisement

Network and Security Manager Administration Guide
GTP objects.....................................................................80
HA for guiSvrClusterMgr.............................................80
historical reports............................................................80
ICAP objects....................................................................80
IDP.......................................................................................80
IDP cluster monitor.......................................................80
IDP migration....................................................................81
IDP Profiler operations..................................................81
IDP rulebase......................................................................81
import device....................................................................81
Infranet Controller operations...................................81
inventory.............................................................................81
investigative log reports...............................................81
IP pools...............................................................................81
job status logs, permission to purge........................81
jobs.......................................................................................81
large binary objects........................................................81
license.................................................................................81
logged in admins.............................................................81
multicast rulebases.......................................................82
NAT objects and subtree.............................................82
network honeypot rulebase.......................................82
NSRP Monitor..................................................................82
permitted objects..........................................................82
phase1/phase2 proposal.............................................82
policy custom field data objects..............................82
policy custom field metadata objects...................82
policy lookup table........................................................82
polymorphic objects.....................................................83
polymorphic service objects......................................83
post domain policies....................................................83
pre domain policies.......................................................83
Profiler................................................................................83
Profiler data.....................................................................83
remote settings...............................................................83
rulebases...........................................................................83
run online retention command.................................83
schedule objects............................................................84
schema..............................................................................84
schema details...............................................................84
security explorer.............................................................83
security policies..............................................................84
servers................................................................................84
service objects................................................................84
shared historical log report........................................84
subdomains and groups.............................................84
supplemental CLIs in devices and
templates.....................................................................85
SYNProtector rulebase................................................85
948
system status monitor, view......................................85
system URL categories................................................85
template operations.....................................................85
traffic signature rulebase............................................85
troubleshoot devices....................................................85
unblock IP.........................................................................85
URL filtering.....................................................................85
user objects.....................................................................86
VLAN objects..................................................................86
VPN Monitor....................................................................86
VPNs...................................................................................86
VSYS profile objects.....................................................86
zone objects....................................................................86
administrators
creating..............................................................................67
permissions......................................................................75
alarm status
setting polling intervals............................................654
viewing............................................................................654
alarms, configuring in firewall rules................................451
alerts, configuring in firewall rules..................................451
antivirus live update settings............................................275
APE rulebase
about................................................................................476
APE rules
adding.....................................................................476, 477
configuring......................................................................476
configuring actions.....................................................480
configuring attack severity......................................483
configuring IP actions.................................................481
configuring Match columns.....................................478
configuring notification.............................................482
configuring services....................................................479
configuring source and destination......................478
API.................................................................................................10
APN filter
about................................................................................379
network ID, setting......................................................380
selection mode, setting............................................380
application
object...............................................................................328
application objects..............................................................328
Application Profiler view......................................................711
application relocation, configuring in firewall
rules.......................................................................................453
ASN1-DN...................................................................................571
atomic configuration
about.................................................................................241
atomic updating...........................................................242, 741
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents