Index - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Index

A
Abstract Data Model..........................................................308
Access Point Name See APN
Action Manager
about....................................................................................31
actions, configuring in firewall rules..............................452
active sessions
information available.................................................682
session display filter..................................................684
session filter..................................................................683
viewing............................................................................682
active statistics
about...............................................................................668
viewing.............................................................................681
active VPN
details, viewing.............................................................692
information, viewing...................................................673
activities See administrator activities
Adding the APE Rulebase.................................................483
Adding the Exempt Rulebase..........................................492
address filter
setting..............................................................................769
address objects
about................................................................................326
configuring in firewall rules.....................................450
address shifting See NAT-dst, and NAT-src
address spoofing, defined................................................833
Administer panel......................................................................31
Administrative reports...............................................810, 814
administrator activities
action attributes.............................................................75
address objects...............................................................76
administrator roles.........................................................76
administrators.................................................................76
allow pre/post rules......................................................76
antivirus profiles.............................................................76
attack update..................................................................76
audit logs............................................................................77
auditable activities........................................................76
authentication server....................................................77
Copyright © 2010, Juniper Networks, Inc.
AV pattern..........................................................................77
backdoor rulebase..........................................................77
blocked IP..........................................................................77
CA..........................................................................................77
catalog objects................................................................77
channel...............................................................................77
CLI-based reports...........................................................77
CLI-based security update..........................................77
config sync status...........................................................77
configlet..............................................................................77
CRLs....................................................................................78
custom troubleshoot commands............................78
dashboard.........................................................................78
database versions..........................................................78
deep inspection pack selection................................78
device administrators...................................................78
device BGP operations.................................................78
device certificates..........................................................78
device configuration......................................................79
device CPU limit.............................................................79
device delta config.........................................................79
device firmware..............................................................79
device log comments...................................................79
device log flags................................................................79
device logs........................................................................79
device passwords...........................................................79
device reboot...................................................................79
device running config....................................................79
device site survey...........................................................79
device software keys.....................................................79
device status monitor...................................................79
device to/from file.........................................................78
device Web categories................................................80
devices, groups, templates........................................80
DI objects..........................................................................80
extranet policy objects................................................80
failover device.................................................................80
firewall rulebases..........................................................80
force logout administrators.......................................80
get entitlement from entitlement server.............80
group expressions...........................................................81
957

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents