Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1022

Table of Contents

Advertisement

Network and Security Manager Administration Guide
rulebases
about................................................................................438
permissions......................................................................84
rules
about...............................................................................440
duplication......................................................................510
S
SA devices See Secure Access devices
scan manager, configuring in firewall rules................462
scans
detecting........................................................................502
other scans....................................................................503
port and network scans............................................502
TCP and UDP scans...................................................502
schedule objects
about................................................................................334
configuring in firewall rules.....................................458
schema See device schema
Screen reports...............................................................810, 813
ScreenOS clusters, adding.................................................153
ScreenOS devices
activating with dynamic IP address......................135
activating with static IP address.............................132
adding clusters..............................................................153
configuring features of...............................................194
importing with dynamic IP address.......................118
importing with static IP address..............................113
rapid deployment.........................................................139
supported platforms......................................................13
ScreenOS firmware
adjusting version on device.....................................269
upgrading.......................................................................266
ScreenOS policy name......................................................465
SCTP
Objects............................................................................395
searching for logs by ID......................................................768
searching in UI
about...................................................................................33
locating IP addresses...................................................36
locating patterns at the beginning of a
string...............................................................................34
locating patterns within a string...............................34
using regular expressions............................................35
Secure Access clusters
adding...............................................................................153
importing.........................................................................154
972
Secure Access devices
adding clusters..............................................................153
configuring features of...............................................196
importing clusters........................................................154
importing with dynamic IP address........................121
supported platforms....................................................20
Security Explorer
exporting data to HTML.............................................737
permissions....................................................................735
using...................................................................................731
usingt................................................................................734
views..................................................................................731
Security Monitor
about...................................................................................27
using.................................................................................709
security policies....................................................................435
about........................................................................28, 436
assigning to a device.................................................509
changing rule order......................................................515
cut, copy, paste....................................................515, 516
device policy pointers.................................................519
device-specific distribution.....................................667
exporting........................................................................520
importing devices with inactive policies............520
installing...............................................................468, 483
managing.........................................................................514
merging.....................................................................56, 518
permissions......................................................................85
reimporting.....................................................................518
rule groups.......................................................................517
rule shadowing..............................................................510
rulebases........................................................................438
rules..................................................................................440
session rematch............................................................513
templates.......................................................................447
updating...........................................................................513
validating.......................................................................509
validation tool..............................................................509
validation, rule duplication.......................................510
validation, rule shadowing........................................510
validation, unsupported options.............................511
validation, zone mismatch.......................................510
security policy
editing rules....................................................................776
object versions..............................................................776
security policy distribution, viewing.............................668
self log entries........................................................................749
self logs.....................................................................................743
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents