Network and Security Manager Administration Guide
xviii
Copying and Editing Predefined Attack Objects to Create Custom Attack
Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Creating UTM Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Miscellaneous UTM Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Extension Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Command Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
URL Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
URL Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
ScreenOS Threat Management Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Configuring Antivirus Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Copyright © 2010, Juniper Networks, Inc.
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers