Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1011

Table of Contents

Advertisement

excluding.........................................................................228
list entries.......................................................................226
ordered list entries, adding with............................229
overriding values in.....................................................228
reverting to values in..................................................228
sharing across multiple devices.............................230
templates, using with................................................230
validating........................................................................226
wildcards, using with..................................................226
configuration logs report.....................................................811
configuration states............................................................249
configuration summary, running...........................253, 256
Configure panel........................................................................27
configuring
ACVPN.............................................................................625
destination NAT object..............................................419
Junos NAT policy.........................................................539
Junos OS NAT object...................................................417
legacy NAT object........................................................415
logging....................................................................739, 743
monitoring...........................................................659, 709
NAT objects....................................................................414
reporting.........................................................................809
source NAT object........................................................417
TACACS Authentication Server.............................404
VPNs..................................................................................551
configuring in rule.................................................................465
configuring objects................................................................321
connection states.................................................................249
connections, BGP peer......................................................306
counting, configuring in firewall rules...........................457
CRLs (certificate revocation list)...................................424
custom applications............................................................333
custom Citrix client.............................................................284
custom log views..................................................................759
custom reports
creating.............................................................................817
deleting............................................................................818
organizing........................................................................818
custom sign-in pages..........................................................278
customer support..................................................................xlix
contacting JTAC............................................................xlix
CVE references......................................................................346
D
Dashboard
using.................................................................................709
Copyright © 2010, Juniper Networks, Inc.
Data Model
defined............................................................................308
importing..........................................................................311
updating.........................................................................309
data model, defined...........................................................839
data origination icons..........................................................192
data point count, configuring.................................782, 823
data types................................................................................781
Deep Inspection
activating subscription on device.........................289
attack objects, custom..............................................343
checking attack object database..........................293
local attack object update......................................290
profiles in firewall rules.............................................463
profiles, about...............................................................337
updating attack object database.........................289
default values in templates...............................................210
delta configuration summary................................253, 256
deny action, configuring in firewall rules.....................453
dependant activities..............................................................75
destination NAT object.......................................................419
destination NAT policy.......................................................543
destination NAT, configuring in firewall rules............455
device certificates, permissions........................................78
device configuration
about................................................................................188
importing...........................................................................112
link from Log Viewer...................................................776
memory optimization..................................................191
modeling.........................................................................130
permissions..............................................................79, 80
promoting to template..............................................202
unsupported in UI.........................................................195
updating..........................................................................256
device connection
modifying........................................................................195
to NSM..............................................................................195
device delta config, permission to view.........................79
Device Edit dialog
EX Series devices...........................................................191
IDP devices......................................................................192
Infranet Controller devices........................................191
J Series devices...............................................................191
ScreenOS devices........................................................192
Secure Access devices................................................191
Device Editor
about................................................................................189
Index
961

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents