Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 127

Table of Contents

Advertisement

Table 16: Predefined NSM Administrator Activities (continued)
Function
Audit Logs
Authentication Server
AV Pattern
Backdoor Rulebase
Blocked IP
CA
Catalog Objects
Channel
CLI-based Reports
CLI-based Security Update
Config Sync Status
Configlet
Copyright © 2010, Juniper Networks, Inc.
Task
Description
View
An audit log records an administrative change (such as login, update, or
policy change) to the managed devices or management system.
Create
An authentication server provides authentication services for NSM
administrators and remote access services (RAS) users on your network.
Delete
The information stored in an authentication server determines the
privileges of each administrator.
Edit
View
Update
Updates the pattern file on the devices with the latest AV signatures.
Create
This activity enables an administrator to manage the Backdoor Rulebase
within a security policy. Rules configured in this rulebase are supported
Edit
only on IDP-capable security devices, such as an ISG2000 or ISG1000
gateway running 5.0–IDP1.
View
View
Allows an administrator to view a list of IP addresses blocked because
of repeated failed attempts to log in to the server.
Create
A CA object represents a Certificate Authority which is a trusted third
party that verifies an electronic signature.
Delete
Edit
View
Create
Catalog objects enable the management of report folders.
Delete
Edit
View
View
N/A
This activity enables an administrator to generate predefined and shared
historical log reports using the guiSvrCli command utility.
N/A
This activity enables an administrator to update the attack object
database on the NSM system using guiSvrCli command utility.
Check
Verifies the configuration status of the device.
View
A configlet is a small, static configuration file that contains information
on how a security device can connect to NSM.
Chapter 3: Configuring Role-Based Administration
77

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents