Using A Filter To Search For A Policy Version; Editing Comments For An Existing Policy Version; Comparing Two Versions - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.

Using a Filter to Search for a Policy Version

This section explains how to use a filter to search for a policy version.
To use a filter to search for a version:
In the NSM GUI, right-click on a policy.
1.
In the popup menu, select View Versions.
2.
The Version History window appears.
In the window, select the version and click Filter/Search.
3.
The Version Filter Definition dialog box appears.
In the dialog box, fill in the filter criteria:
4.
Comment Contains — Enter a comment on which to filter the version search.
Created After — Use the up and down arrows to select the date and time.
Created Before — Use the up and down arrows to select the date and time
Press OK.
5.
The Version History now displays existing versions that meet the criteria.
When you are finished, press Close.
6.

Editing Comments for an Existing Policy Version

This section explains how to edit comments for an existing policy version.
To edit comments for an existing version
In the NSM GUI, right-click on a policy.
1.
In the popup menu, select View Versions.
2.
The Version History window appears.
In the Version History window, select an existing version and press Edit Comments.
3.
The Database Version dialog box displays the Version Comments.
Change the comments and click OK.
4.
The Version History window displays the new comments.
When you are finished, click Close.
5.

Comparing Two Versions

This section explains how to compare two existing versions.
When you import a device with assigned policy objects, and there is a difference between
the existing and imported objects, NSM creates a new policy object that has two versions.
The older version being the original and the newer version being the modified object. You
can then use the compare versions tool to find out the changes to the object.
Chapter 9: Configuring Security Policies
523

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents