Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1024

Table of Contents

Advertisement

Network and Security Manager Administration Guide
technical support
contacting JTAC............................................................xlix
template
validating........................................................................204
template operations directive...........................................217
template value icon..............................................................193
templates..................................................................................101
about.......................................................................189, 198
applying...........................................................................201
applying multiple templates...................................204
benefits............................................................................198
configuration groups, using with...........................230
creating...........................................................................200
default values................................................................210
device groups.................................................................210
example of....................................................................200
exporting.........................................................................222
importing.........................................................................222
limitations......................................................................209
list key parameters......................................................210
maximum.......................................................................209
modifying values in......................................................199
overriding........................................................................203
overview.............................................................................55
permissions.....................................................................80
predefined entities.......................................................210
security policy...............................................................447
setting priority..............................................................204
unsupported device options.........................204, 220
third-party host checker policies....................................281
time binding for custom attack object..........................351
time-based filter
setting .............................................................................770
timeline
logging.............................................................................765
timeout for authentication user.....................................396
TLS................................................................................................22
toolbar in UI...............................................................................25
Top Alarms report..................................................................811
Top Attackers (DI) report..................................................829
Top Attackers (Screen) report...............................814, 829
Top Attacks (DI) report.......................................................812
Top Attacks (Screen) report...................................813, 829
top axis, Log Investigator....................................................781
Top Configuration Changes report................................828
Top Configuration Logs report..........................................811
Top FW/VPN Rules report.................................................827
Top Information Logs report.............................................812
Top Rules report....................................................................814
974
Top Self Logs report.............................................................812
Top Targets (Screen) report...................................814, 829
Top Traffic Alarms report....................................................811
Top Traffic Log report...........................................................811
Traffic Anomalies Rulebase
other scans....................................................................503
session limiting............................................................503
TCP and UDP scans...................................................502
traffic device-specific views.............................................667
traffic distribution
by protocol, viewing....................................................670
by security policy, viewing.......................................668
by VPN, viewing.............................................................671
for device, viewing......................................................668
traffic log report......................................................................811
traffic shaping
about................................................................................455
DSCP class selector...................................................456
mode................................................................................456
troubleshooting, sending commands to
device...................................................................................684
Trust-Untrust port mode...................................................105
Trust-Untrust-DMZ port mode........................................107
Trust/Untrust/DMZ (Extended) port mode...............108
tunnel interfaces
configuring for VPN....................................................566
configuring single for ScreenOS 5.x......................573
tunnel zones
configuring.....................................................................566
U
UAC See Infranet Controller devices
UAC reports.............................................................................810
UDP header matches for custom attack
object...................................................................................358
Unified Access Control See Infranet Controller
devices
Unified Access Control (UAC) reports..........................814
unreachable workflow
activating device...........................................................135
importing device............................................................118
updating attack object database..................................289
updating IDP engine............................................................295
URL categories, permission to update on
system....................................................................................85
user authentication, configuring in firewall
rules......................................................................................462
user flag See flag
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents