GTP objects.......................................................................81
HA for guiSvrClusterMgr...............................................81
historical reports.............................................................81
ICAP objects......................................................................81
IDP........................................................................................81
IDP cluster monitor........................................................81
IDP migration....................................................................81
IDP Profiler operations..................................................81
IDP rulebase......................................................................81
import device....................................................................81
Infranet Controller operations..................................82
inventory............................................................................82
investigative log reports..............................................82
IP pools..............................................................................82
job status logs, permission to purge.......................82
jobs......................................................................................82
large binary objects.......................................................82
license................................................................................82
logged in admins............................................................82
multicast rulebases.......................................................82
NAT objects and subtree.............................................82
network honeypot rulebase.......................................83
NSRP Monitor..................................................................83
permitted objects..........................................................83
phase1/phase2 proposal.............................................83
policy custom field data objects..............................83
policy custom field metadata objects...................83
policy lookup table........................................................83
polymorphic objects.....................................................83
polymorphic service objects......................................83
post domain policies....................................................84
pre domain policies......................................................84
Profiler................................................................................84
Profiler data.....................................................................84
remote settings..............................................................84
rulebases...........................................................................84
run online retention command.................................84
schedule objects............................................................84
schema..............................................................................84
schema details...............................................................84
security explorer.............................................................84
security policies..............................................................85
servers................................................................................85
service objects................................................................85
shared historical log report........................................85
subdomains and groups.............................................85
supplemental CLIs in devices and
templates.....................................................................85
SYNProtector rulebase................................................85
system status monitor, view......................................85
system URL categories................................................85
template operations.....................................................86
traffic signature rulebase............................................86
troubleshoot devices....................................................86
unblock IP.........................................................................86
URL filtering.....................................................................86
user objects.....................................................................86
VLAN objects..................................................................86
VPN Monitor....................................................................86
VPNs...................................................................................87
VSYS profile objects......................................................87
zone objects.....................................................................87
administrators
creating..............................................................................67
permissions......................................................................76
alarm status
setting polling intervals............................................664
viewing............................................................................664
alarms, configuring in firewall rules...............................457
alerts, configuring in firewall rules..................................457
antivirus live update settings..........................................280
APE rulebase
about...............................................................................483
APE rules
adding...................................................................483, 484
configuring.....................................................................483
configuring actions.....................................................487
configuring attack severity......................................490
configuring IP actions................................................488
configuring Match columns....................................484
configuring notification............................................489
configuring services...................................................486
configuring source and destination.....................485
API.................................................................................................10
APN filter
about...............................................................................384
network ID, setting......................................................385
selection mode, setting............................................385
application
object................................................................................332
application objects..............................................................332
Application Profiler view.....................................................721
application relocation, configuring in firewall
rules......................................................................................459
ASN1-DN.................................................................................580
atomic configuration
about................................................................................245
atomic updating...........................................................246, 751
Copyright © 2010, Juniper Networks, Inc.
958
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...