Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1020

Table of Contents

Advertisement

Network and Security Manager Administration Guide
services, custom..........................................................389
URL predefined categories.......................................379
users................................................................................404
users, external..............................................................405
users, local.....................................................................404
VIP, global.......................................................................416
ordered lists...................................................................212, 229
OS fingerprinting
enabling............................................................................713
override icon............................................................................193
P
packet context......................................................................354
packet data
managing in logs..........................................................753
viewing in logs...............................................................755
pattern file, updating on device.....................................300
perfect forward secrecy....................................................430
permit action, configuring in firewall rules.................453
policies
Junos NAT.......................................................................539
security policies............................................................518
policy name, ScreenOS.....................................................465
policy statistics.....................................................................750
policy validation tool..........................................................509
policy version...........................................................................521
polymorphic objects...........................................................530
port mode
about................................................................................104
changing.............................................................................111
Combined.......................................................................106
DMZ-Dual-Untrust......................................................109
Dual-Untrust..................................................................106
Home-Work....................................................................105
Trust-Untrust.................................................................105
Trust-Untrust-DMZ......................................................107
Trust/Untrust/DMZ (Extended)............................108
port number range filter
setting................................................................................771
port scanning.........................................................................502
pre/post rules........................................................................526
predefined entities in templates.....................................210
Predefined log views...........................................................759
predefined reports
generating........................................................................817
predefined views...................................................................757
preferred ID, configuring in firewall rules.....................459
prerules and postrules........................................................526
preview tools..........................................................................252
970
primary interface, fail over................................................305
priority levels for traffic shaping.....................................456
Profiler
alerts..................................................................................714
configuring.......................................................................712
configuring permitted objects.................................719
context profiles..............................................................713
customizing preferences............................................715
data viewer.............................................................718, 719
filtering and sorting.....................................................722
MAC/view area..............................................................725
operations on devices without IDP rules.............715
setting up..........................................................................711
settings.............................................................................712
starting..............................................................................715
stopping............................................................................715
time intervals.................................................................723
updating settings..........................................................714
using.................................................................................709
profiler
using for keeping networks current.......................727
using for network baseline........................................727
using for stopping worms and trojans.................729
Profiler DB
accessing records in...................................................730
purging records.............................................................726
Profiler reports..............................................................810, 815
Profiler views
about.................................................................................716
using..................................................................................722
protected resources...................................................427, 563
protocol anomaly attack objects, custom.................359
protocol distribution...........................................................750
device-specific view, described.............................667
viewing............................................................................670
protocol filter
setting..............................................................................769
Protocol Profiler view............................................................717
R
RADIUS
authentication of NSM users....................................68
authentication server example...............................401
authentication servers..............................................398
compatibility with RFC 2138...................................398
ranges........................................................................................770
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents