Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1014

Table of Contents

Advertisement

Network and Security Manager Administration Guide
setting a domain filter................................................770
setting a flag filter.......................................................769
setting a port number range filter...........................771
setting a port range filter............................................771
setting a protocol filter..............................................769
setting a range filter....................................................770
setting a time-based filter........................................770
setting an address filter............................................769
setting an alert filter...................................................769
find utility.................................................................................768
firewall options......................................................................745
Firewall rule options...........................................................465
firewall rulebase
about...............................................................................440
permissions.....................................................................80
rule groups.....................................................................442
firewall rules
about...............................................................................440
configuring.....................................................................448
configuring actions.....................................................452
configuring address objects....................................450
configuring alerts.........................................................457
configuring antivirus...................................................462
configuring application relocation........................459
configuring authentication.......................................461
configuring counting and alarms...........................457
configuring devices.....................................................453
configuring DI profile..................................................463
configuring GTP object.............................................455
configuring HA session backup.............................459
configuring logging and counting..........................457
configuring NAT...........................................................454
configuring preferred ID............................................459
configuring rule options............................................454
configuring rule title...................................................465
configuring scan manager.......................................462
configuring schedule..................................................458
configuring services....................................................452
configuring traffic shaping.......................................455
configuring Web filtering profile............................460
configuring zones........................................................449
deleting.............................................................................517
deny action....................................................................453
disabling...........................................................................517
negating source or destination..............................450
permit action.................................................................453
reject action...................................................................453
reject action changed to deny..................................511
rule groups.......................................................................517
964
using MIPs as source or destination....................450
VPN links.........................................................................441
VPN rules.........................................................................441
Firewall/VPN reports............................................................811
firmware, adjusting version on device..........................269
first data packet context for custom attack
object....................................................................................354
first packet context for custom attack object...........354
flag.............................................................................................802
flag filters
setting..............................................................................769
flow properties, viewing.....................................................355
flow statistics.........................................................................750
device-specific view, described............................668
viewing.............................................................................676
FQDN........................................................................................580
from object icon.....................................................................193
FW/VPN reports............................................................810, 811
G
group expressions
about................................................................................410
configuring in firewall rules......................................462
group IKE ID............................................................................565
group, device...........................................................................182
GTP
about.................................................................................381
APN filter........................................................................384
configuring in firewall rules......................................455
filtering GTP-in-GTP packets.................................383
IMSI prefix filter............................................................385
limiting GTP message length...................................381
limiting GTP tunnels...................................................382
limiting GTP-C message rate..................................382
message filtering.........................................................386
removing inactive GTP tunnels..............................382
subscriber tracing (lawful interception)............386
traffic counting.............................................................383
traffic logging................................................................383
validating sequence numbers................................382
GUI Server
about.....................................................................................11
configuring for log exporting...................................796
permissions......................................................................85
processes...........................................................................12
guiSvrCLI.sh utility................................................................819
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents