Sign In
Upload
Manuals
Brands
Juniper Manuals
Software
NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Manuals
Manuals and User Guides for Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1. We have
1
Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 manual available for free PDF download: Administration Manual
Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual (1026 pages)
Brand:
Juniper
| Category:
Software
| Size: 13 MB
Table of Contents
Table of Contents
7
About this Guide
45
Audience
45
Objectives
45
Conventions
46
Table 1: Notice Icons
46
Table 2: Text Conventions
46
About this Guide
47
Documentation
47
Table 3: Syntax Conventions
47
Table 4: Network and Security Manager Publications
47
Requesting Technical Support
49
Self-Help Online Tools and Resources
49
Opening a Case with JTAC
50
Getting Started with NSM
51
Chapter 1 Introduction to Network and Security Manager
53
About NSM
53
Security Integration
54
Device Configuration
54
Network Organization
54
Role-Based Administration
54
Centralized Device Configuration
55
Device Management
55
Introduction to Network and Security Manager
55
Device Modeling
56
Importing Devices
56
Policy-Based Management
56
Rapid Deployment
56
Error Prevention, Recovery, and Auditing
57
Atomic Configuration and Updating
57
Device Configuration Validation
57
Introduction to Network and Security Manager
57
Policy Validation
57
Auditing
58
Device Image Updates
58
Complete System Management
58
VPN Abstraction
58
Integrated Logging and Reporting
59
Job Management
59
Monitoring Status
59
Technical Overview
60
Architecture
60
Figure 1: NSM Network Architecture
60
Figure 2: NSM System Architecture
61
Management System
61
User Interface
61
Table 5: GUI Server Processes
62
Managed Devices
63
Firewall and IDP (Screenos/Idp) Devices
63
Table 6: Device Server Processes
63
Table 7: Supported Security Devices
63
Devices Running Junos os
66
Table 8: J Series Services Routers and SRX Series Services Gateways NSM Supports
67
Table 9: M Series Multiservice Edge Routers and MX Series Ethernet Services Routers NSM Supports
68
Table 10: EX Series Ethernet Switches NSM Supports
69
SSL VPN Secure Access Products
70
Table 11: Secure Access Products NSM Supports
70
Extranet Devices
71
Juniper Networks IC Series Unified Access Control Appliances
71
Distributed Data Collection
71
Table 12: IC Series UAC Appliances NSM Supports
71
Device Schemas
72
Security
72
Scaling and Performance
73
Working in the User Interface
73
Characters Not Supported in Login Passwords
73
Managing Blocked Login Attempts
73
Configuring UI Preferences
73
UI Overview
74
Figure 3: Overview of the User Interface
74
Navigation Tree
74
Common Tasks Pane
75
Main Display Area
75
Menu Bar
75
Status Bar
75
Toolbar
75
NSM Modules
75
Investigate Modules
75
Configure Modules
77
Administer Modules
81
Validation Icons in the User Interface
81
Validation and Data Origination Icons
82
Table 13: Validation Status for Devices
82
Table 14: Validation Icons
82
Working with Other NSM Administrators
83
Searching in the User Interface
83
Contains String [C] Search Mode
84
Figure 4: UI Search Modes
84
Figure 5: "Contains String" Search Mode Example
84
Starts with [S] Search Mode
84
Figure 6: "Starts With" Search Mode Example
85
Figure 7: "Regular Expression" Search Mode Details
85
Regular Expression [R] Search Mode
85
Figure 8: "Regular Expression" Search Mode Example
86
IP [I] Search Mode
86
Figure 9: "IP Address" Search Mode Example
87
Search for an Exact Match (E)
87
Global Search
88
Figure 10: Exact String Search Mode Example
88
Chapter 2 Planning Your Virtual Network
91
Configuring Devices Overview
91
Importing Existing Devices
92
Modeling New Devices
93
Planning Your Virtual Network
93
Editing a Device Configuration
94
Configuring IDP-Capable Devices Overview
95
Common Criteria EAL2 Compliance
95
Guidance for Intended Usage
95
Guidance for Personnel
95
Guidance for Physical Protection
95
Supported IDP-Capable Devices
95
Enabling Jumbo Frames (ISG1000 Only)
96
Enabling IDP Functionality
97
Installing Advanced License Keys
97
Module
97
Updating Attack Objects
97
Adding Objects (Optional)
98
Configuring a Security Policy for IDP
98
Reviewing IDP Logs
103
Maintaining IDP
104
Creating IDP-Only Administrators
104
Simplifying Management
105
Using Device Groups
105
Using Device Templates
105
Merging Policies
106
Using Configuration Groups
106
Using a Naming Convention
106
Example: Using a Naming Convention for Address Objects
107
Example: Using a Naming Convention for Devices
107
Figure 11: Selecting the GUI Server in Central Manager
108
Creating an Information Banner
108
Adding an Information Banner
108
Figure 12: Setting up an Information Banner
109
Figure 13: Information Banner Login into Central Manager
109
Modifying an Information Banner
110
Deleting an Information Banner
110
Chapter 3 Configuring Role-Based Administration
111
Domains
111
About Roles
112
Using Role-Based Administration Effectively
113
Enterprise Organizations
113
Administrator Types
114
Service Providers
115
Internal Network
116
Managed Security Service Provider (MSSP)
116
Configuring Role-Based Administration
116
Creating Administrators
117
Configuring General Settings
117
Configuring Authorization
118
RADIUS Authentication and Authorization
118
Table 15: How to Authenticate Users
119
Figure 14: Creating Custom Domain
120
Figure 15: User in Domain "Global" with a Predefined Role
121
Figure 16: User in Domain "Global" with Custom Role "R1
122
Figure 17: User in Subdomain "D1" with a Predefined Role
122
Figure 18: User in Subdomain "D1" with a Custom Role "R1
122
Figure 19: Assigning Multiple Roles to a User in Global Domain
123
Figure 20: Assigning Multiple Roles to a User in Subdomain
123
Configuring Roles
124
Figure 21: Assigning Roles Defined in Domain "Global
124
Figure 22: Assigning Roles Defined in Domain "Global" to Subdomain Only
124
Creating Custom Roles
125
Table 16: Predefined NSM Administrator Activities
125
Permissions Changes in Release 2006.1
137
Roles and Permissions
137
Table 17: Changes to Edit Devices, Device Groups, & Templates Activity
138
Table 18: Changes to View Devices, Device Groups, & Templates Role
138
Assigning and Viewing Custom Roles
139
Configuring a User Activity in a Custom Role
139
Viewing Logged Administrators
139
Forcing an Administrator to Log out
140
Creating Subdomains
141
Example: Configuring Role-Based Administration
141
Viewing Current Domain Detail
141
Step 1: Create the Subdomains
142
Step 2: Create the Subdomain Administrator
142
Step 3: Create the Viewing and Reporting Administrator
142
Figure 23: Manage Administrators and Domains: Administrators Tab
143
Step 4: Verify Administrator Accounts
143
Chapter 4 Adding Devices
147
About Device Creation
148
Adding Devices
149
Determine Device Status
149
Managing the Device
150
Verifying Device Configuration
150
Before You Begin Adding Devices
150
Importing Versus Modeling
151
Modeling Device Configurations
151
Device Add Process
152
Selecting the Domain
152
Figure 24: Connecting Devices from Different Domains in Vpns
153
Adding Single or Multiple Devices
153
Specifying the os and Version
154
Determining Port Mode (Screenos Devices Only)
154
Figure 25: Trust-Untrust Port Mode Bindings
155
Figure 26: Home-Work Port Mode Bindings
155
Combined Port Mode
156
Figure 27: Dual-Untrust Port Mode Bindings
156
Figure 28: Combined Port Mode Bindings
157
Trust-Untrust-DMZ Port Mode
157
Figure 29: Trust-Untrust-DMZ Port Mode Bindings
158
Figure 30: Extended Port-Mode Interface to Zone Bindings
158
Table 19: Extended Bindings
158
Figure 31: DMZ Dual Untrust Port Mode
159
Table 20: Security Device Port Mode Summary (Part 1)
160
Table 21: Security Device Port Mode Summary (Part 2)
160
Changing the Port Mode
161
Table 22: Supported Add Device Workflows by Device Family
161
Importing Devices
162
Requirements
163
Adding and Importing Devices with Static IP Addresses
163
Screenos Devices
163
IDP Sensors
165
Junos Devices
166
SA and IC Devices
167
Adding Devices with Dynamic IP Addresses
168
Screenos Devices
168
IDP Sensors
170
Device
171
Adding and Importing a Junos Device with a Dynamic IP Address
175
Verifying Imported Device Configurations
178
Using Device Manager
178
Using Device Monitor
178
Using Configuration Summaries
179
Using Job Manager
179
Modeling Devices
180
Modeling a Device
181
Requirements
181
Creating a Device Configuration
182
Activating a Device
182
Devices with Static IP Addresses
182
Devices with Dynamic IP Addresses
185
Using Rapid Deployment (Screenos Only)
189
Creating the Configlet
191
Installing the Configlet
193
Preparing the Device
194
Installing the Configlet
194
Updating the Device Configuration
195
Delta Option
196
Fails
196
Summarize Delta Configuration
196
But Has no Admin Privileges
197
Option
197
Adding Vsys Devices
197
Placing the Root Device in a Global Domain or a Subdomain
197
Figure 32: Connecting Vsys Devices Across Domains
198
Importing Vsys Devices
198
Modeling Vsys Devices
199
Adding L2V Root Systems
200
Adding an Extranet Device
201
Adding Clusters
201
Adding a Cluster Device Object
202
Adding Members to the Cluster
202
Adding Screenos or IDP Clusters
203
Adding Secure Access or Infranet Controller Clusters
203
Through Reachable Workflow
205
Adding Clusters of Routers Running Junos os
206
Adding a Junos Cluster with Modeled Cluster Members
207
Adding and Importing a Junos Cluster
207
Activating and Updating a Modeled Junos Cluster
208
Figure 33: Adding a Secure Access Cluster
209
Example: Adding and Importing a Cluster
209
Adding the Cluster
209
Adding the Cluster Members
210
Adding the Cluster
211
Importing the Cluster Configuration
211
Members
211
Figure 34: Adding a J Series Cluster
212
Figure 35: Adding the First Member to a J Series Cluster
212
Modeling the Cluster Members
212
Activating the Cluster Members
213
Figure 36: Adding the Second Member to a J Series Cluster
213
Figure 37: Cluster Member Icons
213
Updating the Cluster
215
Adding a Vsys Cluster and Vsys Cluster Members
215
Example: Adding a Vsys Cluster
216
Figure 38: Configuring Cluster Members for Paris Vsys Cluster
217
Figure 39: Paris Cluster Members and Paris Vsys Cluster Members
218
Adding a Device Discovery Rule
218
Running a Device Discovery Rule
219
Adding Many Devices Using CSV Files
219
Creating the CSV File
220
Table 23: CSV File Information for Devices with Static IP Addresses
221
Table 24: CSV File Information for Devices with Dynamic IP Addresses
222
Table 25: CSV File Information for Undeployed Devices
225
Validating the CSV File
227
Importing Many Devices
227
Adding and Importing Many Devices with Dynamic IP Addresses
228
Adding and Importing Many Devices with Static IP Addresses
228
Modeling Many Devices
229
Using Rapid Deployment
230
Modeling and Activating Many Devices with Configlets
230
Activating Many Devices with Configlets
231
Adding Device Groups
231
Example: Creating a Device Group
232
Setting up NSM to Work with Infranet Controller and Infranet Enforcer
233
Avoiding Naming Conflicts of the Authorization Server Object
233
Avoiding NACN Password Conflicts
235
Chapter 5 Configuring Devices
237
About Device Configuration
238
About Configuring Device Families
238
Objects
238
Configuring Devices
239
Configuration Features
239
About Device Templates
239
About the Device Editor
239
About Configuration Groups
240
Editing Devices Using the Device Editor
240
Figure 40: Device Info and Configuration Tabs
241
Figure 41: Screenos and IDP Device Configuration Information
242
Validation and Data Origination Icons
242
Configuring Device Features
243
Table 26: Validation Icons
243
Figure 42: Screenos Device Object Configuration Data
244
Configuring Secure Access or Infranet Controller Device Features
246
Figure 43: Secure Access Device Object
246
Configuring Junos Device Features
247
Updating the Configuration on the Device
248
Using Device Templates
248
Modifying Values in Templates
249
Example: Creating and Applying a Device Template for DNS Settings
250
Applying the Template
251
Figure 44: Example of Setting Values in a Template
251
Figure 45: Applying a Template
252
Templates and Importing Devices
252
Promoting a Device Configuration to a Template
252
Figure 46: Template Override Icon
253
Figure 47: Revert to a Template or Default Value
253
Changing Values Inherited from Templates
253
Reverting a Configuration to Default Values of a Template
254
Templates and Validation
254
Applying Multiple Templates
254
Example: Using Multiple Device Templates
255
Figure 48: View Denial of Service Defense Values from Dos Template
256
Figure 49: Configure Dos Defense Settings for the Dos2 Template
257
Figure 50: View Template Priority (Dos Highest)
258
Figure 51: View Values from Dos and Dos2 Templates
258
Figure 52: View Dos2 Value for Source IP Based Session Limit
259
Figure 53: View Dos Value for SYN-ACK-ACK Proxy Protection Setting
259
Figure 54: View Default SYN-ACK-ACK Proxy Protection Setting
259
Template Limitations
259
Maximum of 63 Templates
259
Default Values
260
Device Groups
260
List Key Fields
260
Predefined Device Data
260
Figure 55: up and down Arrows for Changing the Sequence of a List
261
Specifying the Order of List Entries
261
Combining Template Data with Device Object Data
262
Operations that Change the Sequence of Ordered Lists
262
Order
262
Examples of Reordered Lists
263
Rules for Reordering Lists
263
Configuration Group Order
266
Figure 56: Identifying Ordered List Entries that Do Not Match the Template
267
Using the Template Operations Directive
267
Figure 57: Template Operations Directive
268
Select Devices Section
268
Select os Name Section
268
Select Template Section
268
Figure 58: Select Template Dialog Box
269
Options Section
269
Template Operation Section
269
Template Operations Box Recommended Workflow
270
Figure 59: Template Operations Job Information Dialog Box
271
Removing Templates with the Template Operations Directive
271
Exporting and Importing Device Templates
272
Exporting a Device Template
272
Importing a Device Template
272
Using Configuration Groups
273
Creating and Editing Configuration Groups
274
Creating a Configuration Group
274
Figure 60: Adding a Configuration Group
275
Editing a Configuration Group
276
Ordered Lists and Wildcard Matching
276
Validating a Configuration Group
276
Applying a Configuration Group
276
Figure 61: Applying a Configuration Group
277
Figure 62: Configuration Group Applied
277
Figure 63: Excluding a Configuration Group
278
Editing a Device Object that Uses Configuration Groups
278
Deleting a Configuration Group
279
Adding Ordered List Entries Using Configuration Groups
279
Reordering Lists
280
Using Configuration Groups with Templates
280
Sharing Configuration Group Definitions Across Multiple Devices
280
Configuring Clusters
284
Configuring Cluster Objects Directly by Editing the Configuration
284
Configuring Cluster Objects Using Templates
284
Configuring Member-Level Data in a Junos Cluster
285
Configuring Junos Devices with Redundant Routing Engines
286
Configuring a Routing Engine
286
Figure 64: Configuring Routing Engine Specific Parameters
287
Viewing a Routing Engine Configuration
287
Figure 65: Viewing the Routing Engine Configuration
288
Overview of VRRP Support in NSM
288
Platforms on Which NSM Supports VRRP
289
Activating VRRP on a Device Interface
289
Defining a VSI as a VRRP Interface
289
Managing Configuration Files
290
Viewing and Comparing Configuration File Versions
290
Updating the Device with a Configuration File Version
290
Importing or Viewing the Current Version of the Configuration File
290
Automatic Import of Configuration Files
291
Chapter 6 Updating Devices
293
About Updating
293
How the Update Process Works
294
Updating Devices
295
Devices
297
Knowing When to Update
298
Verifying Device Status in Device Monitor
299
Configuration Status
299
Connection Status
299
Verifying Device Status in Device Manager
301
Reviewing Logs
301
Identifying Administrative Changes
302
Reviewing Reports
302
Using Preview Tools
302
Running a Configuration Summary
303
Using a Delta Configuration Summary
303
Table 28: Delta Configuration Summary Information
304
Figure 66: Delta Configuration Summary Example
305
Performing an Update
306
Retrying a Failed Update
307
Configuring Update Options
307
Update Options for DMI-Compatible Devices
308
Tracking Device Updates
308
Figure 67: Job Manager Module
309
Figure 68: Job Information Dialog Box
310
Reviewing Job Information
310
Table 29: Device States During Update
311
Understanding Updating Errors
312
Figure 69: Failed Update Job Dialog Box
313
Chapter 7 Managing Devices
315
Managing Device Software Versions
316
Upgrading the Device Software Version
316
Managing Devices
317
Upgrading a Device Software Version from NSM
318
Upgrading a Device Software Version Outside NSM
318
Adjusting the Device os Version
319
Downgrading the Device os Version
319
Rolling Back the Device os Version
319
Deleting the Device os Version
320
Upgrading Device Support
320
Managing License Keys (Screenos Only)
320
Installing License Keys on a Device
321
Importing License Key Information into NSM
321
Installing Trial License Keys
321
Viewing and Reconciling Device Inventory
322
Viewing the Device Inventory
322
Figure 70: Viewing the Device Inventory
323
Comparing and Reconciling Device Inventory
323
Figure 71: Comparing the Device Inventory with the NSM Database
324
Uploading and Linking Large Binary Data Files
326
Figure 72: Adding a Shared Binary Data Object
327
Figure 73: Linking to a Shared Binary Data Object
328
Importing Custom Sign-In Pages
328
Creating a Custom Sign-In Page
329
Linking to a Custom Sign-In Page Shared Object
329
Importing Antivirus Live Update Settings
330
Linking to a Live Update File Shared Object
330
Importing Endpoint Security Assessment Plug-In (ESAP) Packages
330
Uploading ESAP Packages
330
Linking to an ESAP Package Shared Object
331
Importing Third-Party Host Checker Policies
331
Uploading a Third-Party Host Checker Policy
331
Linking to a Third-Party Host Checker Policy Shared Object
332
Uploading a Secure Virtual Workspace Wallpaper Image
332
Importing Hosted Java Applets (Secure Access Devices Only)
333
Linking to a Hosted Java Applet Shared Object
333
Uploading a Java Applet
333
Importing a Custom Citrix Client .Cab File (Secure Access Devices Only)
334
Linking to a Custom Citrix .Cab File Shared Object
334
Uploading a Custom Citrix Client .Cab File
334
Backing up and Restoring SA and IC Devices
334
Backing up an SA or IC Device
335
Restoring SA or IC Devices
335
Backing up Multiple SA or IC Devices
335
Configuring Preferences for Backing up and Restoring SA or IC Devices
335
Viewing Backed up Versions for an SA or IC Device
336
Setting the RMA State on an SA/IC Device
336
Activating an SA/IC Device Set to the RMA State
337
Performing a Full Restore of an SA or IC Device
338
Managing User Sessions for SA and IC Devices
338
Activating Subscription Services
339
Managing the Attack Object Database
339
Updating the Attack Object Database
340
Updating Attack Objects for IDP-Enabled Devices
340
Updating DI Attacks on Screenos 5.0 Devices
342
Using Updated Attack Objects
343
Verifying the Attack Object Database Version
343
Automatic Verification
343
Managing Different Attack Database Versions
344
Manual Verification
344
Versions
345
Updating the IDP Detector Engine
345
Figure 74: Attack Update Summary
346
Example: Confirm IDP Engine Version
346
Scheduling Security Updates
346
Table 30: Scheduled Security Update (SSU) Command Line Parameters
347
Example: Update Attack Objects and Push to Connected Devices
348
Scheduling the Update
348
Example: Using Crontab to Schedule Attack Updates
349
Viewing Scheduled Security Updates in the Audit Log Viewer
350
Viewing Scheduled Security Updates in the Job Manager
350
Updating AV Pattern Files
350
Updating the Web Category List
350
Miscellaneous Device Operations
351
Launching a Telnet CLI Window
352
Launching a Web UI for a Device
352
Rebooting Devices
352
Refreshing DNS Entries
353
Updating the Device Clock with an NTP Server
353
Setting the Root Administrator on a Device
354
Failing over or Reverting Interfaces
355
Setting the RMA State on a Device
355
Troubleshooting a BGP Peer Session on a Device
356
Upgrading the os Version During an RMA-Activate Device Workflow
356
Finding Usages
357
Reactivating Wireless Connections
357
Managing Screenos Device Capabilities
357
Abstract Data Model
358
Data Model Schema
358
Data Model Updating
359
Figure 76: Data Model Update
360
Data Model Importing
361
Figure 77: Data Model Importing
362
Figure 75: Import/Update Architecture
358
Archiving and Restoring
363
Archiving Logs and Configuration Data
363
Restoring Logs and Configuration Data
364
Managing Device Schemas through the Juniper Update Mechanism
364
Downloading Schemas
365
Downloading Schemas Using the GUI Server CLI
366
Downloading Schemas Using the NSM UI
366
Applying a Schema
367
Chapter 8 Configuring Objects
371
About Objects
372
Configuring Objects
373
Replacing Objects
374
Using Objects Across Domains
374
Working with Object Versions
375
Working with Unused Shared Objects
375
Deleting an Unused Shared Object
375
Searching for Unused Shared Objects
375
Configuring Address Objects
376
Searching for and Deleting Duplicate Objects
376
Creating Address Objects
377
Adding a Network Address Object
378
Adding an Address Object Group
379
Editing and Deleting Address Objects
379
Replacing Address Objects
379
Adding a Multicast Group Address Object
380
Adding Static DNS Host Addresses
381
Table 31: Application Table Tab Information
382
Viewing Address Objects
377
Blocked Hosts
382
Configuring Application Objects
382
Viewing Predefined Application Objects
382
Creating Custom Application Objects
383
Editing and Deleting Application Objects
384
Configuring Schedule Objects
384
Creating Schedule Objects
384
Configuring Access Profile Objects
385
Configuring Quality of Service Profiles
385
Creating a Quality of Service Profile
386
Deleting a Quality of Service Profile
386
Editing a Quality of Service Profile
387
Working with DI Attack Objects
387
Viewing Predefined DI Attack Objects
387
Viewing Attack Version Information for Attack Objects
388
Viewing Predefined DI Attack Object Groups
388
Updating Predefined DI Attack Objects and Groups
388
Creating DI Profiles
388
Table 32: Deep Inspection Profile Actions
389
Table 33: Deep Inspection IP Actions
390
Working with IDP Attack Objects
391
Viewing Predefined IDP Attacks
391
Viewing Predefined IDP Attack Groups
391
Viewing Attack Version Information for Attack Objects and Groups
392
Updating Predefined IDP Attack Objects and Groups
392
Configuring Custom DI and IDP Attack Objects
393
Using the Attack Object Wizard
393
Objects
394
Configuring Attack Name and Description
394
Configuring Extended Information
395
Configuring External References
395
Configuring Target Platforms
396
Creating a Signature Attack Object
397
Configuring General Attack Properties
397
Table 34: IP Protocol Name and Type Numbers
398
Table 35: Supported Services for Service Bindings
399
Configuring Attack Detection Properties
402
Table 36: Attack Pattern Syntax
402
Table 37: Attack Pattern Syntax Example Matches
403
Configuring Header Match Properties
405
Table 38: DI Attack Header Match Modifiers
406
Configuring a Protocol Anomaly Attack Object
409
Configuring a Compound Attack Object
409
Configuring Compound Attack Members
410
Configuring General Attack Properties
410
Configuring the Direction Filter
412
Creating Custom DI Attack Groups
412
Creating Custom IDP Attack Groups
413
Creating Static Attack Groups
413
Creating Dynamic Attack Groups (IDP Only)
414
Figure 78: New Dynamic Group
415
Figure 79: New Dynamic Group Members
416
Updating Dynamic Groups
416
Editing a Custom Attack Group
417
Deleting a Custom Attack Group
417
Unified Threat Management
417
Creating UTM Profiles
417
Creating an Antivirus Profile
418
Creating an Antispam Profile
419
Creating a Content Filtering Profile
419
Creating a URL Filtering Profile
420
Extension Lists
421
Miscellaneous UTM Features
421
Multipurpose Internet Mail Extension (MIME) Lists
421
Command Lists
422
URL Categories
422
URL Patterns
422
Configuring External AV Profiles
424
Configuring Internal AV Profiles
425
Configuring ICAP AV Servers and Profiles
426
Configuring ICAP AV Profiles
427
Configuring Web Filtering Objects
428
Configuring Custom Policy Fields
429
Defining Metadata
430
Instantiating New Objects
430
Adding Custom Detail Object to Rules
430
Open Log Viewer
431
Configuring GTP Objects
431
Configuring Info
431
Limiting GTP Message Length
431
Limiting GTP Message Rate
432
Limiting GTP Tunnels
432
Removing Inactive GTP Tunnels
432
Validating Sequence Numbers
432
Filtering GTP-In-GTP Packets
433
Inspecting Tunnel Endpoint Ids
433
Removing GTP R6 Informational Elements
433
Configuring Traffic Logging and Counting
433
Traffic Counting
433
Traffic Logging
433
Configuring IMSI Prefix and APN Filtering
434
Creating an APN Filter
434
Creating an IMSI Prefix Filter
435
Configuring GTP Message Filtering
436
Configuring Subscriber Tracing (Lawful Interception)
436
Example: Creating a GTP Object
436
Configuring Service Objects
437
Viewing Predefined Services
437
Table 39: Service Table Tab Information
438
Creating Custom Services
439
Service Object Groups
440
Example: Creating a Custom Service and Group
441
Example: Creating a Custom Sun-RPC Service
442
Example: Creating a Custom MS-RPC Service
443
Editing and Deleting Service Objects
444
Replacing Service Objects
444
Configuring SCTP Objects
445
Configuring an SCTP Object
445
Configuring Authentication Servers
445
Configuring General Authentication Server Settings
446
Configuring Authentication Server Redundancy
446
Configuring Authentication for User Types
447
Domain Name Stripping
447
Configuring Authentication Server Types
448
Configuring a RADIUS Authentication Server
448
Configuring a Securid Authentication Server
452
Configuring an LDAP Authentication Server
453
Configuring a TACACS Authentication Server
454
Configuring User Objects
454
Configuring Local Users
454
Configuring Local User Groups
455
Configuring External Users
455
Configuring External User Groups
456
Configuring VLAN Objects
458
Configuring IP Pools
458
Using Multiple IP Ranges
459
Table 40: Group Expression Operators
460
Configuring Group Expressions
460
Figure 80: Configure External User Groups for Sales and Marketing
462
Figure 81: Configure Group Expression for Sales and Marketing
462
Configuring Remote Settings
463
Configuring Routing Instance Objects
463
Viewing Routing Instance Objects
464
Creating Routing Instance Objects
464
Configuring NAT Objects
464
Configuring Legacy NAT Objects
465
Configuring DIP Objects
465
Configuring Destination NAT Objects
466
Configuring MIP Objects
466
Configuring VIP Objects
466
Configuring Junos os NAT Objects
467
Configuring Source NAT Objects
467
Table 41: Source NAT Configuration Options
468
Configuring Destination NAT Objects
469
Table 42: Destination NAT Configuration Options
470
Configuring Certificate Authorities
472
Using Certificate Authorities
473
Configuring Certificate Authorities
473
Configuring CRL Objects
474
Using Crls
474
Configuring Crls
475
Configuring Extranet Policies
475
Configuring Binary Data Objects
476
Adding Binary Data Objects
476
Viewing, Editing, and Deleting Binary Data Objects
477
Configuring Protected Resources
477
Creating Protected Resources
478
Editing Protected Resources
478
Configuring IKE Proposals
478
Creating Custom IKE Phase1 Proposals
479
Creating Custom IKE Phase 2 Proposals
480
Configuring Dial-In Objects
481
Creating a Dial-In Profile
481
Linking the Dial-In Profile with the Device
482
Setting the Time-Out Period for the Modem Dial-In Authentication
482
Configuring Border Signaling Gateway Objects
482
Chapter 9 Configuring Security Policies
485
About Security Policies
486
Viewing Rulebase Columns for a Security Policy
486
Configuring Security Policies
487
Figure 82: Displaying the Select Visible Columns Dialog Box
487
About Rulebases
488
Rule Execution Sequence
489
About Rules
490
About Firewall Rulebases
490
Firewall Rules (Zone and Global)
490
VPN Links and Rules
491
About Rule Groups
492
About the Multicast Rulebase
492
About IDP Rulebases on ISG Family Devices
492
About IDP Rulebases on Standalone IDP Sensors
493
Enabling Ipsec Null Encryption for IDP Inspection
494
Managing Security Policies
494
Creating a Security Policy
494
Configuring Objects for Rules
495
Applying the same Object to Multiple Rules
495
Running Screenos or Junos os
496
Using the Policy Filter Tool
496
Filtering the Comment Field
496
Using a Predefined IDP Policy
496
Using the Policy Creation Wizard
497
Adding Rulebases
498
Configuring Firewall Rules
498
Defining Match for Firewall Rules
499
Configuring Source and Destination Zones for Firewall Rules
499
Configuring Source and Destination Addresses for Firewall Rules
500
Support for Any-Ipv6 as a Source Address
501
Configuring Services for Firewall Rules
502
Defining Actions for Firewall Rules
502
Selecting Devices for Firewall Rules
503
Configuring Firewall Rule Options
504
Enabling NAT
504
Configuring Traffic Shaping in a Security Policy
505
Enabling GTP for Firewall Rules
505
Enabling Logging and Counting for Firewall Rules
507
Miscellaneous
508
Configuring Web Filtering for Firewall Rules
510
Configuring Authentication for Firewall Rules
511
Configuring Antivirus for Firewall Rules
512
Configuring a DI Profile/Enable IDP for Firewall Rules
513
Limiting Sessions Per Policy from Source Ips
514
Configuring the Session Close Notification Rule
515
Comments for Firewall Rules
515
Configuring Multicast Rules
516
Configuring Source and Destination Zones
516
Configuring Source and Destination Groups
516
Configuring Rule Options
516
Configuring Antivirus Rules
517
Configuring Antispam Rules
518
Configuring IDP Rules
518
Defining Match for IDP Rules
519
Configuring Source and Destination Address Objects for IDP Rules
519
Configuring Source and Destination Zones for IDP Rules (Does Not Apply to Standalone IDP Sensor Rulebases)
519
Configuring User Roles for IDP Rules
520
Configuring Services for IDP Rules
521
Configuring Terminal IDP Rules
522
Table 43: IDP Rule Actions
523
Defining Actions for IDP Rules
523
Configuring Attack Objects in IDP Rules
525
Adding IDP Attack Object Groups by Category
525
Adding IDP Attack Objects by Operating System
526
Adding IDP Attack Objects by Severity
526
Table 44: Severity Levels, Recommended Actions and Notifications
526
Adding Custom Dynamic Attack Groups
527
Configuring IP Actions in IDP Rules
527
Choosing a Block Option
528
Choosing an IP Action
528
Figure 83: Configure IP Action
528
Setting Logging Options
528
Setting Timeout Options
529
Configuring Notification in IDP Rules
529
Setting VLAN Tags for IDP Rules
530
Setting Severity for IDP Rules
530
Setting Target Devices for IDP Rules
531
Entering Comments for IDP Rules
531
Configuring Multiple IDP Policies for an MX Series Router
531
Configuring Application Policy Enforcement (APE) Rules
533
Adding the APE Rulebase Using the Policy Manager
533
Adding the APE Rulebase to a Policy Using the Application Profiler
534
Defining Matches for APE Rules
534
Configuring Source and Destination Address Objects for APE Rules
535
Configuring Services for APE Rules
536
Configuring User Roles for APE Rules
536
Table 45: APE Rule Actions
537
Configuring Actions for APE Rules
537
Configuring IP Actions in APE Rules
538
Choosing an IP Action
538
Choosing a Block Option
539
Setting Logging Options
539
Setting Timeout Options
539
Configuring Notification in APE Rules
539
Setting VLAN Tags for APE Rules
540
Setting Severity for APE Rules
540
Setting Target Security Devices for APE Rules
541
Entering Comments for APE Rules
541
Configuring Exempt Rules
541
Adding the Exempt Rulebase
542
Defining a Match
542
Configuring Source and Destination Address Objects
542
Configuring Source and Destination Zones
542
Setting Attack Objects
543
Specifying Vlans
543
Setting Target Devices
543
Entering Comments
543
Creating an Exempt Rule from the Log Viewer
543
Configuring Backdoor Rules
544
Adding the Backdoor Rulebase
545
Defining a Match
545
Configuring Source and Destination Address Objects
545
Configuring Source and Destination Zones
545
Configuring Services
546
Setting Operation
546
Table 46: Actions for Backdoor Rule
546
Setting Actions
546
Setting Notification
546
Logging Packets
547
Setting an Alert
547
Setting Logging
547
Setting Severity
547
Entering Comments
548
Setting Target Devices
548
Specifying Vlans
548
Configuring SYN Protector Rules
548
The TCP Handshake
548
SYN-Floods
548
Adding the SYN Protector Rulebase
549
Configuring Source and Destination Address Objects
549
Defining a Match
549
Setting Mode
550
Configuring Services
550
Setting Notification
550
Setting an Alert
551
Setting Severity
551
Entering Comments
552
Setting Target Devices
552
Specifying Vlans
552
Configuring Traffic Anomalies Rules
552
Detecting TCP and UDP Port Scans
552
Example: Traffic Anomalies Rule
552
Detecting Other Scans
553
Example: Session Limiting
553
Example: Traffic Anomalies Rule
553
Session Limiting
553
Adding the Traffic Anomalies Rulebase
553
Configuring Services
554
Configuring Source and Destination Address Objects
554
Defining a Match
554
Setting Detect Options
554
Setting Response Options
554
Setting Notification
554
Logging Packets
555
Setting an Alert
555
Setting Logging
555
Setting Severity
555
Entering Comments
556
Specifying Vlans
556
Setting Target Devices
556
Configuring Network Honeypot Rules
556
Impersonating a Port
556
Adding the Network Honeypot Rulebase
556
Configuring the Source
557
Defining a Match
557
Configuring Destination Address Objects and Services
557
Setting Operation
557
Setting Response Options
557
Setting Notification
557
Setting Logging
557
Setting Severity
558
Logging Packets
558
Setting an Alert
558
Specifying Vlans
558
Setting Target Devices
558
Entering Comments
558
Installing Security Policies
559
Assigning a Security Policy to a Device
559
Validating Security Policies
559
Table 47: Rule Shadowing Example
561
Unsupported Options
561
Installing New Security Policies
561
Configuring IDP Policy Push Timeout
562
Updating Existing Security Policies
563
Updating Only the IDP Rulebases on ISG Devices
564
Managing Rules and Policies
564
Helpful Tips
564
Selecting Rules
565
Editing Rule Order
565
Using Cut, Copy, and Paste on Rules
565
Dragging and Dropping Objects
566
Using Cut, Copy, and Paste on Rule Fields
566
Deleting a Rule
567
Disabling a Rule
567
Using Rule Groups
567
Reimporting Devices and Security Policies
568
Merging Policies
568
Figure 84: Security Policy a Rules (before Policy Merge)
569
Figure 85: Security Policy B Rules (before Policy Merge)
570
Figure 86: Security Policy Rules (Merged from Policy a and Policy B)
570
Importing SRX Series Devices that Contain Inactive Policies
570
Exporting Policies
570
Automatic Policy Versioning
571
Setting NSM to Automatic Policy Versioning
571
Creating a New Policy Version
572
Viewing Existing Policy Versions
572
Comparing Two Versions
573
Editing Comments for an Existing Policy Version
573
Using a Filter to Search for a Policy Version
573
Restore an Older Version
574
Viewing, Editing, Filtering, and Sorting Database Versions
574
Displaying the Differences between Database Versions
575
Update Device with an Older Database Version
576
Pre and Post Rules
576
Rule Application Sequence
578
Install-On Column for Prerules and Postrules
578
Screenos Devices
578
Validation of Prerules and Postrules
578
Managing Prerules and Postrules
579
Add Prerules and Postrules
579
Modify Prerules and Postrules
579
Push Prerules and Postrules to Regional Server
579
Delete Prerules and Postrules
580
Polymorphic Objects
580
Customizing Polymorphic Objects
580
Access Control of Polymorphic Object
581
Supported Polymorphic Object Categories
581
Table 48: Polymorphic Objects
581
Validation of Polymorphic Object
581
Manage Polymorphic Objects
581
Add a Polymorphic Object to a Pre/Post Rule
582
Create a Polymorphic Object
582
Devices
583
Map a Polymorphic Object to a Real Value
583
Chapter 10 Configuring Voice Policies
585
Adding a BSG Transaction Rulebase
585
Adding Rules to the BSG Transaction Rulebase
586
Chapter 11 Configuring Junos NAT Policies
589
Source NAT Policy
589
Adding a Source NAT Rulebase
590
Adding a Rule Set to the Source NAT Rulebase
590
Adding a Rule to a Source NAT Rule Set
591
Editing a Source NAT Rule or Rule Set
592
Destination NAT Policy
593
Adding a Destination NAT Rulebase
594
Adding a Rule Set to a Destination NAT Rulebase
594
Adding a Rule to a Destination NAT Rule Set
595
Editing a Destination NAT Rule or Rule Set
596
Static NAT Policy
597
Adding a Static NAT Rulebase
597
Adding a Rule Set to a Static NAT Rulebase
597
Adding a Rule to a Static NAT Rule Set
598
Editing a Static NAT Rule/Rule Set
599
Chapter 12 Configuring Vpns
601
About Vpns
602
Creating System-Level Vpns with VPN Manager
602
Configuring Vpns
603
Creating Device-Level Vpns in Device Manager
603
Supported VPN Configurations
603
Planning for Your VPN
603
Determining Your VPN Members and Topology
604
Site-To-Site
604
Using Network Address Translation (NAT)
604
Full Mesh
605
Hub and Spoke
605
Creating Redundancy
606
Protecting Data in the VPN
606
Using Ipsec
606
Using L2TP
608
Choosing a VPN Tunnel Type
608
About Policy-Based Vpns
609
About Route-Based Vpns
609
VPN Checklist
609
Define Members and Topology
609
Define Method: VPN Manager or Device-Level
610
Define Security Protocol (Encryption and Authentication)
610
Define VPN Type: Policy-Based, Route-Based, or Mixed-Mode
610
Preparing VPN Components
612
Preparing Basic VPN Components
612
Preparing Required Policy-Based VPN Components
612
Configuring Address Objects
613
Configuring Protected Resources
613
Configuring Shared NAT Objects
613
Configuring Remote Access Service (RAS) Users
614
Configuring Required Routing-Based VPN Components
615
Configuring Static and Dynamic Routes
616
Configuring Tunnel Interfaces and Tunnel Zones
616
Creating Certificate Objects
617
Creating PKI Defaults
618
Creating Vpns with VPN Manager
618
Adding the VPN
619
Adding RAS Users
622
Adding Routing-Based Members
622
Configuring Topology
624
Configuring Common VPN Topologies
624
Configuring Gateway Properties
626
Configuring Gateways
626
Defining Termination Points
626
Configuring Gateway Security
628
Configuring IKE Ids
629
Configuring IKE
630
IKE Properties
630
Configuring Security Level
632
Autogenerating VPN Rules
632
Configuring Overrides
633
Editing Policy Rules
633
Editing Device Configuration
634
Viewing the Device Tunnel Summary
634
Adding the VPN Link
635
Editing Vpns
635
Editing Users
635
Editing VPN Protected Resources
635
Editing the VPN Configuration
636
Editing VPN Overrides
636
VPN Manager Examples
636
Example: Configuring an Autokey IKE, Policy-Based Site-To-Site VPN
636
Figure 87: Create Tokyo Protected Resource Object for Autokey IKE VPN
638
Figure 88: Create Paris Protected Resource Object for Autokey IKE VPN
638
Figure 89: Configure Gateway Parameters for Autokey IKE VPN
640
Figure 90: View Autogenerated Rules for Autokey IKE VPN
640
Example: Configuring an Autokey IKE RAS, Policy-Based VPN
641
Figure 91: Add Chicago Protected Resource for Autokey IKE RAS VPN
642
Figure 92: Add New Local User for Autokey IKE RAS VPN
642
Figure 93: Configure Security for Autokey IKE RAS VPN
644
Example: Configuring an Autokey IKE, Route-Based Site-To-Site VPN
644
Figure 94: View Tunnel Summary for Autokey IKE, RB Site-To Site VPN
646
Example: Configuring Xauth Authentication with External User Group
647
Creating Device-Level Vpns
651
Supported Configurations
652
Creating Autokey IKE Vpns
652
Ikev2 and EAP Support
652
Configuring Gateways
653
Configuring Routes (Route-Based Only)
657
Configuring the VPN
657
Adding a VPN Rule
660
Creating Manual Key Vpns
660
Adding Xauth Users
661
Configuring Routes (Route-Based Only)
661
Configuring the VPN
661
Adding a VPN Rule
663
Creating L2TP Vpns
664
Adding L2TP Users
664
Configuring L2TP
664
Creating L2TP over Autokey IKE Vpns
665
Adding a VPN Rule
665
Adding VPN Rules
665
Configuring the VPN
665
Assign and Install the Security Policy
666
Configuring the Security Policy
666
Device-Level VPN Examples
666
Example: Configuring a Route-Based Site-To-Site VPN, Manual Key
667
Figure 95: Configure Tokyo Route for RB Site-To-Site VPN, MK
669
Figure 96: Configure Tokyo Trust Route for RB Site-To-Site VPN, MK
669
Figure 97: View Tokyo Routing Table for RB Site-To-Site VPN, MK
670
Figure 98: Configure Rules for RB Site-To-Site VPN, MK
672
Example: Configuring a Policy-Based Site-To-Site VPN, Manual Key
672
Example: Configuring a Policy-Based RAS VPN, L2TP
674
Auto-Connect Virtual Private Network
675
Configuring ACVPN
676
IVE VPN Monitoring
677
Chapter 13 Central Manager
679
Central Manager Overview
679
Regional Server and Central Manager Self-Sufficiency
679
Self-Sufficient Regional Server
680
Super Admin User
680
Regional Server Management
680
Management Modes for J Series and SRX Series Devices
680
Central Management Mode
680
Device Management Mode
681
Using Central Manager
681
Adding a Regional Server Object
681
Deleting a Regional Server Object
682
Logging into a Regional Server
682
Installing Global Policy to a Regional Server
682
Prerule and Postrule Updates During Global Policy Install
683
Name Space Conflict Resolution for Shared Objects
683
Shared Objects Update During Global Policy Install
683
Name Space Conflict Resolution for Polymorphic Objects
684
Chapter 14 Topology Manager
685
Overview of the NSM Topology Manager
685
About the NSM Topology Manager
685
Requirements for a Topology Discovery
685
About the NSM Topology Manager Toolbar
686
Initiating a Topology Discovery
687
Viewing a Network Topology
688
About the NSM Topology Map Views
688
Subnets View
689
Groups View
689
Menu Options in the Topology Map View
689
About the NSM Topology Table Views
690
Devices View
690
Endpoint Devices View
691
Free Ports View
691
Links View
691
About Topology Manager Preferences
692
Default Credentials Tab
692
Refresh Interval Tab
692
Preferred Subnets Tab
692
Adding Discovered Devices to NSM
692
Chapter 15 Role-Based Port Templates
695
Using Role-Based Port Templates
695
Managing Port Template Associations
696
Apply or Edit a Port Template
696
Detect and Resolve Configuration Conflicts
698
Clone a Port Template
698
Edit a Port Template
699
Chapter 16 Unified Access Control Manager
701
Overview of the Unified Access Control (UAC) Manager Views
701
The Infranet Controller View
701
The Enforcement Point View
702
Manager
702
Manager
703
Enabling 802.1X on Enforcement Point Ports in the UAC Manager
704
Disabling 802.1X on Enforcement Point Ports in the UAC Manager
705
Chapter 17 Realtime Monitoring
709
About the Realtime Monitor
709
Realtime Monitor Views
710
Monitoring Managed Devices
710
Viewing Device Status
710
Realtime Monitoring
711
Table 49: Device Status Information
711
Device Polling Intervals
713
Table 50: Device Polling Intervals
714
Viewing Device Monitor Alarm Status
714
Setting the Polling Interval for Device Alarm Status
714
Table 51: Device Detail Status Items
715
Viewing Additional Device Detail and Statistics
715
Viewing Device Details
715
Table 52: Device Statistics Summary
716
Viewing Device Statistics
716
Table 53: Device-Specific Views
717
Table 54: Policy Distribution Items
719
Table 55: Protocol Distribution Items
720
Table 56: VPN Monitor Table
722
Table 57: Active VPN Table
724
Table 58: Ethernet Statistics View Data
725
Table 59: Flow Statistics View Data
727
Table 60: Attack Counters
728
Table 61: Resource Statistics Items
731
Table 62: Administrators View
732
Table 63: Authenticated Users View
732
Table 64: Active Sessions Items
732
Table 65: HA Statistics View
735
Table 66: Device Status Information
736
Monitoring IDP Sensors
736
Viewing IDP Device Status
736
Viewing IDP Device Detail and Statistics
737
Table 67: IDP Device Detail Status Items
738
Table 68: IDP Sensor Process Status Items
739
Table 69: Device Statistics Summary (for IDP Sensors)
739
Table 70: VPN Tunnel Summary
740
Monitoring Vpns
740
Viewing the VPN Status Summary
740
Configuring a VPN Filter
741
Modifying a VPN Filter
742
Deleting a VPN Filter
742
Configuring a VPN Display Filter
742
Viewing Active VPN Details
742
Table 71: NSRP Device Summary
743
Viewing Device-Specific VPN Information
743
Monitoring NSRP Statistics
743
Viewing NSRP Summary Information
743
Table 72: VSD/RTO Summary
744
Viewing VSD/RTO Information
744
Viewing VSD Counter Details
744
Table 73: VSD Counter Details
745
Table 74: RTO Counters Details
745
Viewing RTO Counter Details
745
Table 75: IDP Cluster Monitor
746
Table 76: IDP Cluster Summary
746
Monitoring IDP Clusters
746
Viewing IDP Cluster Summary Information
746
Table 77: IDP Cluster Member Monitor
747
Monitoring IDP Cluster Members
747
Using the Realtime Monitor
747
Table 78: Server Information
748
Monitoring the Management System
748
Configuring Servers
748
Configuring Device Servers
749
Configuring the GUI Server
750
Table 79: GUI Server Table
750
Using Server Monitor
750
Figure 99: Server Monitor (Machine-Wide Info)
751
Table 80: Server Monitor (Machine-Wide Info) Data
751
Viewing Additional Server Status Details
752
Table 81: Server Detail Status
753
Viewing Process Status
753
Figure 100: Process Status for the Device Server
754
Figure 101: Process Status for the GUI Server
754
Table 82: Process Status
754
Table 83: Management System Utilities
755
Using Schema Information
756
Viewing Device Schema
757
Chapter 18 Analyzing Your Network
759
About the Dashboard
759
About the Profiler
759
Example of Unique Events
760
Analyzing Your Network
761
Setting up the Profiler
761
Configuring the Profiler
762
Table 84: General IDP Profiler Settings
762
Enabling os Fingerprinting
763
Configuring Context Profiles
763
Configuring Network Objects
763
Configuring Alerts
764
Updating Profiler Settings
764
Customizing Profiler Preferences
765
Starting Profiler Operations on ISG Devices Without IDP Rules
765
Starting the Profiler
765
Stopping the Profiler
765
About Profiler Views
766
About the Protocol Profiler
767
Table 85: Protocol Profiler Data
767
About the Network Profiler
768
Table 86: Network Profiler Data
768
About the Violation Viewer
769
Configuring Permitted Objects
769
Table 87: Applciation Profiler Data
771
About the Application Profiler
771
Using Profiler Views
772
Violation Viewer
772
Filtering and Sorting from the Application Profiler
773
Refreshing Profiler Data
774
Viewing Database Information
774
Table 88: Detailed Network Information Data
775
Purging the Database
776
Recommended Profiler Options
776
Configuring a Network Baseline
777
Identifying a Baseline
777
Setting a Baseline
777
Keeping Your Network Current
777
Proactively Updating Your Network
778
Reacting to Vulnerability Announcements
778
Example: Identifying Vulnerable Components
778
Stopping Worms and Trojans
779
Example: SQL Worm
779
Example: Blaster Worm
780
Accessing Data in the Profiler Database
780
About Security Explorer
781
Figure 102: Security Explorer
782
Security Explorer Main Graph
782
Graph Types
783
Connections Detail Pane
783
Log Viewer
784
Reference Point Pane
784
Reports Viewer
784
Using Security Explorer
784
Analyzing Relationships
785
Setting a Time Duration
786
Table 89: Transitional Graphs
786
Transitioning to Other Relational Graphs
786
Adding and Removing Panels
787
Refreshing Data
787
Viewing Predefined Reports
787
Exporting to HTML
787
Chapter 19 Logging
789
About Logging
789
About Log Entries
790
About Log Events
790
About Log Severity
791
Logging
791
Table 91: Log Entry Severity Levels for DMI Devices
791
Table 92: Log Entry Severity Levels for Screenos and IDP Devices
791
Table 90: Event-Generated Log Entries
790
Viewing Logs
792
Device Limitations for Viewing Logs
793
Configuring the Device for Logging
793
Configuring Severity Settings
794
Table 93: Destinations of Log Entry Severities
794
Configuring E-Mail Server Settings
795
Forwarding Self Log Entries (Firewall Options)
795
Table 94: Self Log Entry Settings
795
Table 95: Email Server Settings for Log Entries
795
Configuring Events Reporting Settings
796
Screen Alarm Log Entries
796
Event Alarm Log Entries
797
Traffic Alarm Log Entries
797
Configuration Log Entries
798
Deep Inspection Alarm Log Entries
798
Information Log Entries
799
Self Log Entries
799
Attack Statistics
800
Ethernet Statistics
800
Flow Statistics
800
Policy Statistics
800
Protocol Distribution
800
Traffic Log Entries
800
Atomic Updating Events
801
Configuring SNMP Reporting Settings
801
Directing Logs to a Syslog Server
802
Directing Data to a Webtrends Server
803
Managing Packet Data in Logs
803
Table 96: Syslog Settings for Log Entries
803
Table 97: Webtrends Settings for Log Entries
803
Figure 103: View Packet Data in a Log
805
Figure 104: Sample Packet Data
806
Using the Log Viewer
806
Table 98: EX Series Switch Predefined Log Views
807
Table 99: SSL/UAC Predefined Log Views
808
Creating Custom Views and Folders
809
Table 100: Predefined Log Views
809
Creating Per-Session Views
810
Table 101: Log Viewer Columns
810
Log Viewer Detail Panes
813
Figure 105: View Category and Severity Filters
814
Log Viewer Status Bar
814
Navigating the Log Viewer
814
Searching Log Entries
814
Log Timeline
815
Table 103: Search Tools for Log Viewer
815
Figure 106: Log Viewer Time Slider
816
Figure 107: Log Viewer Time Display
816
Table 104: Log Viewer Flags
817
Using Flags
817
Using Log ID Number
818
Using the Find Utility
818
Table 102: Log Viewer Navigation Controls
814
Filtering Log Entries by Event and Time
818
Setting a Category Filter
818
Setting a Flag Filter
819
Setting a Protocol Filter
819
Setting an Address Filter
819
Setting an Alert Filter
819
Setting a Domain Filter
820
Setting a Time-Based Filter
820
Filtering Log Entries by Range
820
Setting a Bytes in or Bytes out Range Filter
821
Setting a Port Number Range Filter
821
Customizing Columns
822
Hide, Unhide, and Move Columns
822
Using Column Settings
822
Filtering Log Entries by Column
824
Figure 108: Filter Summary Dialog Box
825
Using Log Viewer Integration
826
Jump to Device Configuration
826
Jump to Policy
826
Figure 109: Viewing Summary Panel
827
Table 105: Irrelevant Versus Relevant Attacks
827
Identifying Irrelevant Attacks
827
Using the Log Investigator
828
About the Log Investigator UI
829
Figure 110: Log Investigator UI Overview
829
Configuring Axes
831
Figure 111: Configure Time Period Filter
831
Figure 112: Changing Time Period Filter
831
Setting a Log Entry Limit
832
Table 106: Log Investigator Filters
833
Example: Setting Filters in the Log Investigator
834
Figure 113: View Log Investigator Results
835
Investigating Log Entry Data
835
Using Rows and Columns
835
Table 107: Log Investigator Analysis
836
Using Cells
836
Zoom Details
837
Excluding Data
838
Jumping to the Log Viewer
838
Using the Audit Log Viewer
838
Figure 114: Audit Log Viewer UI Overview
839
Table 108: Audit Log Information
839
Managing the Audit Log Table
840
Setting a Start Time for Audit Log Entries
842
Target View and Device View
842
Managing Log Volume
843
Automatic Device Log Cleanup
843
Archiving Logs
844
Log Archival Mechanism
844
Setting Log Storage Limits
845
Archive Location
845
Date Limits
845
Obsolete Logs
845
Required Disk Space
845
System-Wide Retention Policy
845
Forwarding Logs
846
Sending E-Mail Notification of Downed Device
846
Using the Action Manager to Forward Logs by Domain
847
Configuring Action Parameters
847
Setting Device Log Action Criteria
848
Using the Log2Action Utility to Export Logs
850
Using Filters
850
Table 109: Common Filters
851
Exporting to CSV
853
Exporting to XML
853
Using XML Required and Optional Format-Specific Filters
853
Viewing XML Format Output
853
Exporting to SNMP
854
Using CSV Required and Optional Format-Specific Filters
854
Viewing CSV Format Output
854
Exporting to E-Mail
855
Using SNMP Required and Optional Format-Specific Filters
855
Viewing SNMP Format Output
855
Exporting to Syslog
856
Using E-Mail Required and Optional Format-Specific Filters
856
Using Syslog Required and Optional Format-Specific Filters
856
Exporting to a Script
857
Viewing Syslog Format Output
857
Using Script Required and Optional Format-Specific Filters
858
Reporting
859
Chapter 20 Reporting
859
About Reporting
859
Report Type Groupings
859
Graphical Data Representation
860
Integration with Logs
860
Central Access to Management Information
860
Report Types
861
Predefined Reports
861
Table 110: Firewall and VPN Reports
861
Table 111: DI/IDP Reports
862
Table 112: Screen Reports
863
Table 113: Administrative Reports
864
Table 114: UAC Reports
864
SSL/VPN Reports
865
Table 115: Profiler Reports
865
Table 116: AVT Reports
865
EX Series Switches Report
866
Table 117: SSL/VPN Reports
866
Table 118: EX-Switch Reports
866
My Reports
866
Shared Reports
866
Working with Reports
866
Generating a Predefined Report
867
Creating a Custom Report
867
Example: Creating a Custom Report
867
Deleting Reports
868
Organizing Reports in Folders
868
Generating Reports Automatically
868
Creating and Editing Action Scripts
869
Running Reports Using the Guisvrcli.sh Utility
869
Using Cron with Scheduled Reports
871
Exporting Reports to HTML
872
Setting Report Options
872
Naming a Report
872
Setting the Report Type
873
Configuring Report Source Data
873
Configuring a Report Time Period
873
Configuring the Data Point Count
873
Configuring the Chart Type
873
Sharing Your Custom Report
874
Modifying Report Filters
874
Configuring Report Processing Warnings
874
Saving Your Report Settings
874
Log Viewer Integration
874
Figure 115: Generating a Quick Report
875
Generating Quick Reports
875
Viewing Logs from Report Manager
875
Using Reports
875
Example: Using Administrative Reports to Track Incidents
876
Figure 116: Logs by User-Set Flag Report
876
Example: Using Administrative Reports to Optimize Rulebases
877
Figure 117: Top FW/VPN Rules Report
877
Example: Using EX Switch Reports to Track Configuration Changes
878
Example: Using SSL/VPN Reports to Track Authentication Failures
878
Figure 118: Top Configuration Changes Report
878
Example: Using DI Reports to Detect Application Attacks
879
Example: Using Screen Reports to Identify Attack Trends
879
Using the Watch List
879
Appendix A Glossary
883
Network and Security Manager (NSM) Term Definitions
883
Table 119: CIDR Translation
887
Table 120: Unmanaged Commands for Firewall/Vpn Devices
909
Appendix B Unmanaged Screenos Commands
909
Table 121: Surfcontrol Web Categories
911
Appendix D Common Criteria EAL2 Compliance
919
Guidance for Intended Usage
919
Guidance for Personnel
919
Guidance for Physical Protection
919
Appendix E Log Entries
921
Table 122: Screen Alarm Log Entries
921
Table 123: Alarm Log Entries
923
Deep Inspection Alarm Log Entries
924
Table 124: Deep Inspection Alarm Log Entries
925
Table 125: Configuration Log Entries
999
Information Log Entries
1001
Table 126: Information Log Entries
1002
Self Log Entries
1003
Traffic Log Entries
1003
GTP Log Entries
1004
Index
1007
Advertisement
Advertisement
Related Products
Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01
Juniper NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1
Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING J SERIES SERVICES ROUTERS AND SRX SERIES SERVICES GATEWAYS GUIDE REV
Juniper NETWORK AND SECURITY MANAGER 2010.4 - NSMXPRESS SERIES II REV 1
Juniper NETWORK AND SECURITY MANAGER 2010.4 - REV1
Juniper NETWORK AND SECURITY MANAGER 2010.4 - M-SERIES AND MX-SERIES DEVICES GUIDE REV 1
Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1
Juniper NETWORK AND SECURITY MANAGER 2010.3 - M-SERIES AND MX-SERIES DEVICES GUIDE REV1
Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1
Juniper NETWORK AND SECURITY MANAGER 2010.3
Juniper Categories
Network Router
Switch
Gateway
Software
Network Hardware
More Juniper Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL