In extended mode, every custom field is displayed as a separate column nested under a
header named
Custom Field.
In compact mode, the custom field values are listed in a
single
Optional Field
column. Filters set in the
Optional Fields
column do not impact the
custom fields.
Right-click on an individual custom field to edit or filter that particular value. A dialog box
appears, displaying the values of the custom field in a tree structure. You can then search,
add, delete or filter any value in that field.
About Rulebases
A rulebase is a set of rules that define how the managed device handles traffic. NSM
supports three firewall rulebases and six IDP rulebases, as detailed in the following
sections. A security policy can contain only one instance of any rulebase type.
By default, the predefined roles System Administrator, Domain Administrator, and IDP
Administrator can view and edit all rulebases. The Read-Only System Administrator and
Read-Only Domain Administrator can only view rulebases. When creating a custom role,
you can include permissions to view or edit individual rulebases.
NSM supports the following firewall rulebases:
•
Zone—Contains rules that apply to traffic from one specific zone to another. Create a
firewall rule in the zone-specific rulebase when you need to control traffic between
specific zones. The zone-specific rulebase can contain firewall rules and VPN rules
and links.
•
Global—Contains rules that are valid across all zones. Create a firewall rule in the global
rulebase when you need to control specific traffic across the entire firewall. The global
rulebase can contain only firewall rules.
•
Multicast—Contains rules that enable IGMP proxy or PIM-SM multicast control traffic
between zones.
NSM supports different kinds of IDP-capable devices that can provide firewall and IDP
functionality: standalone IDP appliances, ISG gateways, J Series routers, SRX Series
gateways, and MX Series routers.
NSM supports the following IDP rulebases:
•
IDP—This rulebase protects your network from attacks by using attack objects to detect
known and unknown attacks. Juniper Networks provides predefined attack objects
that you can use in IDP rules. You can also configure your own custom attack objects.
NOTE:
Juniper Networks updates predefined attack objects on a regular basis to keep
current with newly-discovered attacks.
•
APE—This rulebase is used by IDP devices to detect network traffic based on application
signatures and to take specified action.
•
Exempt —This rulebase works in conjunction with the IDP rulebase to prevent
unnecessary alarms from being generated. You configure rules in this rulebase to
Copyright © 2010, Juniper Networks, Inc.
432
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...