Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1008

Table of Contents

Advertisement

Network and Security Manager Administration Guide
GTP objects.......................................................................81
HA for guiSvrClusterMgr...............................................81
historical reports.............................................................81
ICAP objects......................................................................81
IDP........................................................................................81
IDP cluster monitor........................................................81
IDP migration....................................................................81
IDP Profiler operations..................................................81
IDP rulebase......................................................................81
import device....................................................................81
Infranet Controller operations..................................82
inventory............................................................................82
investigative log reports..............................................82
IP pools..............................................................................82
job status logs, permission to purge.......................82
jobs......................................................................................82
large binary objects.......................................................82
license................................................................................82
logged in admins............................................................82
multicast rulebases.......................................................82
NAT objects and subtree.............................................82
network honeypot rulebase.......................................83
NSRP Monitor..................................................................83
permitted objects..........................................................83
phase1/phase2 proposal.............................................83
policy custom field data objects..............................83
policy custom field metadata objects...................83
policy lookup table........................................................83
polymorphic objects.....................................................83
polymorphic service objects......................................83
post domain policies....................................................84
pre domain policies......................................................84
Profiler................................................................................84
Profiler data.....................................................................84
remote settings..............................................................84
rulebases...........................................................................84
run online retention command.................................84
schedule objects............................................................84
schema..............................................................................84
schema details...............................................................84
security explorer.............................................................84
security policies..............................................................85
servers................................................................................85
service objects................................................................85
shared historical log report........................................85
subdomains and groups.............................................85
supplemental CLIs in devices and
templates.....................................................................85
SYNProtector rulebase................................................85
958
system status monitor, view......................................85
system URL categories................................................85
template operations.....................................................86
traffic signature rulebase............................................86
troubleshoot devices....................................................86
unblock IP.........................................................................86
URL filtering.....................................................................86
user objects.....................................................................86
VLAN objects..................................................................86
VPN Monitor....................................................................86
VPNs...................................................................................87
VSYS profile objects......................................................87
zone objects.....................................................................87
administrators
creating..............................................................................67
permissions......................................................................76
alarm status
setting polling intervals............................................664
viewing............................................................................664
alarms, configuring in firewall rules...............................457
alerts, configuring in firewall rules..................................457
antivirus live update settings..........................................280
APE rulebase
about...............................................................................483
APE rules
adding...................................................................483, 484
configuring.....................................................................483
configuring actions.....................................................487
configuring attack severity......................................490
configuring IP actions................................................488
configuring Match columns....................................484
configuring notification............................................489
configuring services...................................................486
configuring source and destination.....................485
API.................................................................................................10
APN filter
about...............................................................................384
network ID, setting......................................................385
selection mode, setting............................................385
application
object................................................................................332
application objects..............................................................332
Application Profiler view.....................................................721
application relocation, configuring in firewall
rules......................................................................................459
ASN1-DN.................................................................................580
atomic configuration
about................................................................................245
atomic updating...........................................................246, 751
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents