Example Of A Mapping File - Juniper SECURITY THREAT RESPONSE MANAGER - APPLICATION CONFIGURATION GUIDE REV 1 Configuration Manual

Table of Contents

Advertisement

4
D
A
EFINING
PPLICATION
Step 8
Step 9
Example of a
Mapping File
M
APPINGS
Note: For information on creating or editing views, see the STRM Administration
Guide.
From the menu, select Configurations > Deploy configuration changes.
The Deploy configuration changes window appears:
Click Close.
You have successfully deployed your changes.
15000 1010 10.100.100/24,10.100.50.10:* 172.14.33.33:80,443 AllowedWebTypeA
15000 1010 10.100.30/24:* 172.14.33.20:80 AllowedWebTypeA
15100 * *:33333 64.35.20/24,64.33/16,64.77.34.12:33333,33350-33400 GameX
15100 1,34803,34809 *:33333 *:33333,33350-33400 GameX
STRM Default Application Configuration Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SECURITY THREAT RESPONSE MANAGER - APPLICATION CONFIGURATION GUIDE REV 1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Strm

Table of Contents