Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1015

Table of Contents

Advertisement

H
HA session backup, configuring in firewall
rules......................................................................................459
HA statistics, viewing.........................................................685
high availability
device-specific views, described..........................668
statistics.........................................................................685
historical reports, permissions............................................81
Home-Work port mode......................................................105
host checker policies...........................................................281
hosted Java applets............................................................283
I
ICMP
header properties........................................................358
icons
configuration group value.........................................193
error...................................................................................193
from object.....................................................................193
override.............................................................................193
template value..............................................................193
warning.............................................................................193
idle session timeout............................................................396
IDP.............................................................................................290
about..................................................................................45
local attack object update......................................290
migrating sensors...........................................................97
updating attack object database.........................289
See also security module
IDP clusters, adding..............................................................153
IDP devices
activating with static IP address.............................133
adding clusters..............................................................153
configuring features of...............................................194
importing with dynamic IP address......................120
importing with static IP address..............................115
supported platforms......................................................13
IDP rulebase
about...............................................................................468
adding to security policy..........................................448
types.................................................................................438
IDP rules
configuring..........................................................448, 468
configuring attack severity......................................480
configuring attacks......................................................475
configuring IP actions.................................................477
configuring Match columns....................................469
configuring notification.............................................479
Copyright © 2010, Juniper Networks, Inc.
configuring services.....................................................471
configuring source and destination......................470
IDP sensors
activating with dynamic IP address......................135
IKE
proposals........................................................................428
IMSI
prefix filter......................................................................385
information banner................................................................58
information logs report.......................................................812
Infranet Controller clusters
adding...............................................................................153
importing.........................................................................154
Infranet Controller devices
adding clusters..............................................................153
configuring features of...............................................196
importing clusters........................................................154
importing with dynamic IP address........................121
supported platforms......................................................21
Infranet Enforcer, setting up..............................................183
installing license key on device.........................................271
interface failover, forcing on device...............................305
interface statistics, viewing..............................................675
interfaces
device-specific views, described..........................668
statistics..........................................................................675
inventory See device inventory
Investigate panel.....................................................................25
investigative log reports, permissions.............................82
IP header matches for custom attack object............356
IP pools
configuring....................................................................408
using multiple ranges................................................409
ISG
push IDP rulebase only...............................................514
J
J Series clusters
activating.........................................................................158
adding...............................................................................156
configuring......................................................................235
importing..........................................................................157
modeling..........................................................................157
J Series devices
activating clusters........................................................158
activating with dynamic IP address......................136
activating with static IP address............................134
adding clusters..............................................................156
adding multiple with discovery rules....................168
Index
965

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents