2.
From the policy rule field you want to update, right-click in the field and select
Edit
> Paste
.
The field value you cut or copied is added in the field that received the paste
operation. If an element is pasted into a field that specifies “any,” then “any” is deleted.
Cut, copy, and paste operations are not supported for the following policies:
•
VPN policy rules
•
Central rules on a regional server regular policy.
The following limitations apply to cut, copy and paste operations:
•
Cut operations on fields of predefined policies are disallowed because predefined
policies cannot be edited; however, copy operations are supported.
•
There is no undo operation for cut, copy, or paste.
•
You can copy but cannot cut fields that specify “any” or “default.”
•
Cut, copy, and paste operations are supported on negate source or destination
addresses, but only the address is cut or copied, not the negation. When pasting into
a field, the existing negate attribute in the field takes precedence.
Dragging and Dropping Objects
Use the pull-down menu in the “Shared Objects For Policy” pane to easily select and add
shared objects, including address, service, Global MIP, Global VIP, attack, device, VLAN,
and custom field objects, to your security policies. Select the object and drag it into the
appropriate policy column. When you drag objects beyond the visible rows or columns,
the scroll bar will move horizontally or vertically, if there are more rules or columns
available into which an object can be dropped.
From the main Address Tree and Service Tree, you can drag Address and Service objects
into and out of groups.
Drag and drop support is also available in configuration dialogs for the following:
•
Source and Destination columns of Zone-based and Global Firewall rulebases
•
Source, Destination, and Attacks columns of IDP rulebase
•
Source, Destination, and Application columns of APE rulebase
•
Source, Destination, and Attacks columns of Exempt rulebase
•
Source and Destination columns of Backdoor rulebase
•
Source and Destination columns of Network Honeypot rulebase
•
Source and Destination columns of Traffic Anamolies rulebase
•
Source and Destination columns of SYN Protector rulebase
•
Source and Destination columns of Permitted Object entries
509
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...