Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 131

Table of Contents

Advertisement

Table 16: Predefined NSM Administrator Activities (continued)
Function
Group Expressions
GTP Objects
HA for guiSvrClusterMgr
Historical Log Reports
ICAP Objects
IDP
IDP Cluster Monitor
IDP Migration
IDP Profiler Operations
IDP Rulebase
Import Device
Copyright © 2010, Juniper Networks, Inc.
Task
Description
Create
Group expressions allow the system administrator to set conditions for
authentication requirements for external users stored on a RADIUS server.
Delete
Edit
View
Create
GPRS Tunneling Protocol (GTP) objects applied to a security policy rule
enable a security device to manage GTP traffic. If a GTP packet matches
Delete
the rule, the device attempts to further match the packet data with the
parameters set in the GTP object.
Edit
View
N/A
Enables the system administrator to configure HA parameters for the
GUI server.
View
A historical log report is a report generated using historical log entries. If
an administrator can view historical log reports, then that administrator
can also view shared historical log reports and their definitions.
Create
An ICAP object defines a server or server group to act as an ICAP AV
server.
Delete
Edit
View
Create
Enables a system manager to create, delete, edit, or view IDP devices.
Delete
Edit
View
View
Enables a system administrator to run the IDP Cluster Monitor and monitor
IDP clusters.
N/A
This activity enables an administrator to view the Profiler.
Create
This activity enables an administrator to manage the IDP Rulebase within
a security policy. Rules configured in this rulebase are supported only on
Edit
IDP capable devices, such as the ISG2000, ISG1000 running 5.0–IDP1,
SRX Series, J Series, and MX Series.
View
Allows an administrator to import device information to NSM from the
device, including Inventory information.
Chapter 3: Configuring Role-Based Administration
81

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents