Importing SRX Series Devices That Contain Inactive Policies
When NSM imports an SRX Series device that contains an inactive policy, the inactive
policy configuration is imported into the NSM device configuration table (device obj), as
occurs in the case of in-device policy management. In addition, the inactive policies are
not displayed on the UI when the device is in central policy manager mode. All shared
objects that are used in the inactive policies are imported into their respective shared
objects table. Consequently, if the shared object (that is used in the inactive policy) is
edited or deleted, the changes are updated to the device on next update.
NOTE:
Re-importing an SRX Series device that contains inactive policies does not
create duplicates of the shared objects that are included in the inactive policies in NSM.
Exporting Policies
You can export a security policy rulebase to an HTML file.
To export a security policy, select
File
>
Export Policy
. (You can also use the button or
Alt-E.) In the
Export Policy
dialog box, select from the following options:
•
Select all rulebases
•
Expand rule groups
•
Show expanded view
•
Print filter condition
•
Link all shared object details
•
Run in background
Click the
Browse
button to select a default export directory for all future exports. Click
Export
to export the file. You can choose to export the policy as a background process
by selecting the
Run in background
option. To check progress during a policy export, click
Export Policy Status
and view the completed percentage in a dialog
Each export creates a new directory. The default directory name is
<policyname>_YYMMDD_HHMMSS
. The export process puts each rulebase in a separate
HTML file in that directory.
Use an HTML browser to view the exported file. Expanded views may make the output
too wide for a standard printer. Shared objects like Address, Service, Install on, Attack
columns and so on, appear as links. Click on a link to view details about the selected
object in a new HTML page.
To export an expanded view of the Zone based Firewall Rules from a security policy,
select a policy from
Policies.
Then select
File
>
Export Policy
from the menu bar. In the
dialog box, select
Zone based Firewall Rules
. Select
Show Expanded View
. Browse to
an export directory and click
Select Export Directory
. Click
Export
.
513
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...