Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1010

Table of Contents

Advertisement

Network and Security Manager Administration Guide
RADIUS user support.................................................399
timeout...........................................................................396
types................................................................................398
authentication users
runtime (external user group)...............................406
timeout...........................................................................396
automatic policy versioning..............................................521
AV
activating subscription on device.........................289
configuring in firewall rules......................................462
update pattern file......................................................300
AVT reports....................................................................810, 815
B
backdoor rulebase
about...............................................................................494
adding to security policy...........495, 499, 503, 506
backdoor rules
configuring.....................................................................494
configuring actions.....................................................496
configuring Match
columns.......................................495, 499, 504, 507
configuring notification.............496, 500, 504, 507
configuring operation................................................496
configuring services..............................496, 500, 504
configuring severity.......................497, 501, 505, 508
configuring source and
destination...........................................495, 499, 504
configuring zones........................................................495
backup interface, fail over.................................................305
BGP, peer connection troubleshooting.......................306
binary data objects..............................................................426
BSG transactions
voice policies
policy manager....................................................535
BugTraq references.............................................................346
byte range filter
setting................................................................................771
C
Central Manager...................................................................629
certificate authorities..........................................................422
chart type, configuring.......................................................823
Citrix client, custom............................................................284
clusters
adding................................................................................151
configuring.....................................................................234
configuring J Series.....................................................235
configuring Junos.........................................................235
960
configuring SRX Series..............................................235
editing the configuration...........................................234
IDP, adding......................................................................153
Infranet Controller, adding........................................153
Infranet Controller, importing..................................154
J Series, activating........................................................158
J Series, adding..............................................................156
J Series, importing.........................................................157
J Series, modeling.........................................................157
Junos, activating...........................................................158
Junos, adding.................................................................156
Junos, importing............................................................157
Junos, modeling.............................................................157
ScreenOS, adding.........................................................153
Secure Access, adding................................................153
Secure Access, importing..........................................154
SRX Series, activating................................................158
SRX Series, adding......................................................156
SRX Series, importing.................................................157
SRX Series, modeling..................................................157
vsys, adding....................................................................165
columns
filtering audit log entries...........................................790
filtering log entries.......................................................774
hiding.................................................................................772
moving..............................................................................772
setting views...................................................................772
Combined port mode..........................................................106
Common Criteria EAL2 Compliance...............................45
Common Tasks pane.............................................................25
compound attack objects
custom............................................................................359
custom, adding protocol anomaly........................361
custom, configuring attack pattern.......................361
custom, configuring ordered match......................361
custom, configuring scope......................................360
configlet
creating..............................................................................141
installing...........................................................................143
configuration data
viewing.............................................................................776
configuration files................................................................240
configuration group value icon.........................................193
configuration groups
about...............................................................56, 190, 223
applying...........................................................................226
creating............................................................................224
deleting............................................................................229
editing..............................................................................226
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents