CHAPTER 8
Configuring Objects
Copyright © 2010, Juniper Networks, Inc.
Objects represent reusable information, such as network addresses, individual users and
user groups, and commonly used configuration data. In Network and Security Manager
(NSM), objects are shared between the global domain and all subdomains.
Objects are the building blocks of the NSM management system. You can use an object
multiple times in the same domain. For example, you can create an address object to
represent a host such as an individual workstation, then use the address object in a VPN
protected resource and as the source or destination in a firewall or multicast rule.
This chapter contains the following sections:
About Objects on page 322
Configuring Address Objects on page 326
Configuring Application Objects on page 332
Configuring Schedule Objects on page 334
Configuring Access Profile Objects on page 335
Configuring Quality of Service Profiles on page 335
Working with DI Attack Objects on page 337
Working with IDP Attack Objects on page 341
Configuring Custom DI and IDP Attack Objects on page 343
Creating Custom DI Attack Groups on page 362
Creating Custom IDP Attack Groups on page 363
Unified Threat Management on page 367
Configuring Custom Policy Fields on page 379
Configuring GTP Objects on page 381
Configuring Service Objects on page 387
Configuring SCTP Objects on page 395
Configuring Authentication Servers on page 395
Configuring User Objects on page 404
Configuring VLAN Objects on page 408
Configuring IP Pools on page 408
321
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers