Pre and Post Rules
In NSM, a policy supports many kinds of rulebases. Each rulebase is an ordered list of
rules. Prerule and postrule lists are also ordered lists of rules that are defined from the
Central Manager at the global domain and subdomain levels as well as on regional servers
in standalone NSM installations. You can define and apply rules for each rulebase type.
When you update a device, device-specific policy configurations are generated for the
device. This creates rulebases by applying the following rules in the following order (from
first to last):
•
Prerules
•
Policy rulebase rules
•
Postrules
The prerules and postrules feature provides a policy definition at a domain level that can
be applied to all devices within the specific domain and all subdomains. Users can define
two sets of rules for any rulebase type that can be applied as prerules and postrules for
any device of the given domain and subdomains.
NOTE:
The Central Manager attack database version must match the regional server
attack database version to push prerules and postrules.
Prerules and postrules are two sets of rules of any rulebase type that can be created for
any domain. Configuration of pre/post rules are located in the main navigational tree
under Policy Manager called Central Manager Policies. Domain Administrators can edit
domain level policies from this option.
Prerules apply before any rules of a rulebase are applied to a device and post rules apply
after any rules of a rulebase are applied to a device. Prerules and postrules in the
integrated view are not editable. There is only one instance of pre/post rules for a specific
domain.
Domain hierarchy is used when applying pre/post rules to subdomains. Within any
subdomain, global domain pre rules take precedence over subdomain pre rules, which
take precedence over Security policy specific rules. Similarly, Security policy rules take
precedence over subdomain post rules, which take precedence over global domain post
rules.
NOTE:
You cannot push a pre/post rule from the central manager to a regional server.
All features of security policies are available for prerules and postrules.
•
Import device command—Imports all rules into the security policy that is created for
the device.
•
Config summary—displays the prerules and postrules.
519
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...