Security Monitor; Audit Log Viewer; Configure Task Modules In The Nsm User Interface Overview; Device Manager - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide

Security Monitor

Audit Log Viewer

Related
Documentation

Configure Task Modules in the NSM User Interface Overview

Device Manager

Table 7: Device Objects in Device Manager
Device Object
Security devices and systems
Vsys devices
Clusters
Vsys cluster
Extranet devices
16
a device or process. For more details on Realtime Monitor, see "Realtime Monitoring" in
the Network and Security Manager Administration Guide.
Security Monitor provides access to the Dashboard, Profiler, and Security Explorer. These
tools enable you to track, correlate, and visualize aspects about your internal network,
enabling you to create more effective security policies and minimize unnecessary log
records. For more details, refer to "Analyzing Your Network" in the Network and Security
Manager Administration Guide.
The Audit Log Viewer contains a log entry for every change made by an NSM administrator.
For more details on Audit Log Viewer, see "Using the Audit Log Viewer" in the Network
and Security Manager Administration Guide.
Configure Task Modules in the NSM User Interface Overview on page 16
Administer Task Modules in the NSM User Interface Overview on page 20
NSM Modules Overview on page 13
The Configure task includes the following top-level modules:
Device Manager on page 16
Security Policies on page 17
VPN Manager on page 17
Object Manager on page 18
The Device Manager contains the device objects that represent your security devices.
Table 7 on page 16 describes the objects that you can create in Device Manger.
Description
The devices you use to enable access to your network and to protect your network against
malicious traffic.
A vsys is a virtual device that exists within a physical security device.
A cluster is two security devices joined together in a high availability configuration to ensure
continued network uptime.
A vsys cluster device is a vsys device that has a cluster as its root device.
Firewalls or VPN devices that are not Juniper Networks security devices.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents