Map A Polymorphic Object To A Real Value; Devices - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Polymorphic objects have a color-coding of green and are ready to be used by Central
Manager prerules and postrules.
Drag the polymorphic object from the Shared Objects section to the Destination
4.
column.

Map a Polymorphic Object to a Real Value

The following procedure assumes that a Central Manager administrator is logged onto
a Central Manager client and a regional server object has been created.
To map a polymorphic object to a real value:
In the toolbar, click the Login to Regional Server drop down list.
1.
Select one or more of the available regional servers and click OK. If you are prompted
2.
to save any changes, select the appropriate option.
The Job Manager provides a status window for pushing the polymorphic object to the
selected regional servers.
In the main navigation tree of the regional server, select Object Manager > Address
3.
Object to show the polymorphic address objects pushed to this regional server.
Double-click the object you want to map to a real value.
4.
Click the Add icon in the toolbar to open the New Address Map Entry dialog box.
5.
Enter the values of the address object you want to map and click OK to map real
6.
values to the polymorphic object you pushed to the regional server.
Mapping Polymorphic Objects Before Importing or Updating Affected Devices
If any polymorphic objects (zone, address, or service) are contained in any pre/post rules
defined by the Central Manager or regional server, mappings for all the polymorphic
objects referenced on the regional server must be defined on the regional server before
you import or update the affected devices. If an error message is returned on import or
update indicating that a mapping for a polymorphic object was not defined, you can
define a mapping for the polymorphic object listed in the error message, and import or
update the device again.
Chapter 9: Configuring Security Policies
533

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents