Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 999

Table of Contents

Advertisement

attack context for custom attack object....................349
attack direction for custom attack object..................350
attack flow for custom attack object...........................350
attack header matches for custom attack
object...................................................................................350
attack name and description for custom attack
object...................................................................................340
attack object
copying predefined.....................................................339
editing copy of predefined.......................................339
attack object database
checking version..........................................................289
managing versions.....................................................290
permissions......................................................................76
updating IDP devices.................................................286
updating overview.......................................................285
updating ScreenOS devices....................................288
attack object groups............................................................357
attack objects
custom compound...........................................342, 354
custom compound, adding members.................356
custom compound, attack pattern......................355
custom compound, ordered match.....................356
custom compound, scope.......................................355
custom protocol anomaly..............................342, 353
custom signature...............................................342, 343
custom signature attacks, attack
context........................................................................349
custom signature, attack direction.......................350
custom signature, attack flow...............................350
custom signature, attack header
matches.....................................................................350
custom signature, attack pattern..........................347
custom signature, attack pattern syntax...........348
custom signature, false positive setting.............343
custom signature, first packet context...............349
custom signature, IP header matches..................351
custom signature, IP protocol and type.............344
custom signature, line context...............................350
custom signature, packet context........................349
custom signature, service binding.........................343
custom signature, stream 256 context..............350
custom signature, stream context.......................350
custom signature, supported services................345
custom signature, TCP header matches............352
custom signature, time binding..............................347
custom signature, UDP header matches...........353
custom, about..............................................................338
custom, extended information................................341
Copyright © 2010, Juniper Networks, Inc.
custom, external references.....................................341
custom, groups.............................................................357
custom, name and description..............................340
custom, target platform............................................342
defined............................................................................825
DI profiles........................................................................333
local update..................................................................286
predefined......................................................................333
updating..........................................................................285
using proxy............................................................288
updating predefined.........................................334, 338
viewing predefined......................................................333
attack pattern for custom attack object......................347
attack pattern syntax.........................................................348
attack statistics..........................................................658, 667
Attacks by Severity (DI) report.......................................802
Attacks by Severity (Screen) report.............................803
Attacks over Time (DI) report.........................................802
Attacks over Time (Screen) report.....................804, 818
audit log entries
filtering by cell................................................................781
migrating.........................................................................782
purging.............................................................................782
setting start time.........................................................782
Audit Log table
column information....................................................779
Audit Log Viewer
about...................................................................................27
defined............................................................................825
device updates, reviewing........................................248
using..................................................................................778
audit logs, permission to view............................................76
Audit-Log table
filtering..............................................................................781
managing.......................................................................780
selecting auditable activities..................................780
sorting..............................................................................780
authentication
configuring in firewall rules......................................455
defined............................................................................825
NSM user..........................................................................68
authentication servers
backup servers..............................................................391
defined............................................................................826
objects.............................................................................390
RADIUS............................................................................393
RADIUS example.........................................................396
RADIUS user support.................................................394
Index
949

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents