Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1021

Table of Contents

Advertisement

rapid deployment
deploying many devices............................................180
overview...............................................................................6
using..................................................................................139
RD See rapid deployment
re-importing devices...........................................................248
reachable workflow
activating device...........................................................132
importing device............................................................113
Realtime Monitor
about..................................................................................26
using.................................................................................659
views................................................................................660
Redundant Routing Engines
configuring.....................................................................236
refreshing DNS entries on devices.................................303
regional server object..........................................................631
reimporting devices.............................................43, 100, 518
reimporting policies.............................................................518
reject action
changed to deny............................................................511
configuring in firewall rules......................................453
rekey...........................................................................................581
remote authentication dial in user service See
RADIUS
remote settings......................................................................413
Report Manager
about..................................................................................26
using................................................................................809
report time period, configuring.......................................823
report types...........................................................................809
reporting options on device
SNMP.................................................................................751
reports
Administrative...............................................................814
Attacks by Severity (DI).............................................812
Attacks by Severity (Screen)...................................813
Attacks over Time (DI)...............................................812
Attacks over Time (Screen).....................................814
AVT....................................................................................815
configuring options.....................................................822
configuring time period.............................................823
count-based..................................................................823
DI.........................................................................................812
EX-Switch.......................................................................816
FW/VPN............................................................................811
Logs by User-set Flag.......................................814, 826
naming.............................................................................822
Profiler..............................................................................815
Copyright © 2010, Juniper Networks, Inc.
Screen...............................................................................813
SSL/VPN.........................................................................815
time-based....................................................................823
Top Alarms.......................................................................811
Top Attackers (Screen).............................................814
Top Attacks (DI)............................................................812
Top Attacks (Screen)..................................................813
Top Configuration Changes ....................................828
Top Configuration Logs...............................................811
Top Information Logs..................................................812
Top Rules.........................................................................814
Top Self Logs..................................................................812
Top Targets (Screen)..................................................814
Top Traffic Alarms.........................................................811
Top Traffic Log................................................................811
Unified Access Control (UAC).................................814
using to optimize rulebases.....................................827
using to track incidents.............................................826
resource statistics
device-specific view, described............................668
viewing.............................................................................681
revocation checking.............................................................423
RFC 2138, RADIUS compatibility....................................398
role-based administration
about...................................................................................61
configuring.................................................................61, 66
creating administrators................................................67
creating roles....................................................................75
creating subdomains.....................................................91
using effectively..............................................................63
using, enterprise organizations.................................63
using, service providers................................................65
roles
about...................................................................................75
assigning...........................................................................89
custom................................................................................75
dependant activities.....................................................75
permissions......................................................................76
root administrator, setting on device...........................304
Routing Engine
configuring.....................................................................236
rule groups, about................................................................442
rule options, configuring in firewall rules....................454
rule shadowing.......................................................................510
rule title....................................................................................465
Rulebase
Exempt............................................................................492
Index
971

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents