attack context for custom attack object.....................354
attack direction for custom attack object..................355
attack flow for custom attack object...........................355
attack header matches for custom attack
object....................................................................................355
attack name and description for custom attack
object...................................................................................344
attack object
copying predefined.....................................................344
editing copy of predefined.......................................344
attack object database
checking version..........................................................293
managing versions......................................................294
permissions......................................................................76
updating IDP devices.................................................290
updating overview......................................................289
updating ScreenOS devices....................................292
attack object groups...........................................................363
attack objects
custom compound............................................347, 359
custom compound, adding members..................361
custom compound, attack pattern.......................361
custom compound, ordered match......................361
custom compound, scope.......................................360
custom protocol anomaly..............................347, 359
custom signature.........................................................347
custom signature attacks, attack context.........354
custom signature, attack direction.......................355
custom signature, attack flow................................355
custom signature, attack header
matches......................................................................355
custom signature, attack pattern..........................352
custom signature, attack pattern syntax............352
custom signature, false positive setting.............348
custom signature, first data packet
context........................................................................354
custom signature, first packet context...............354
custom signature, IP header matches................356
custom signature, IP protocol and type.............348
custom signature, packet context........................354
custom signature, service binding........................348
custom signature, stream 1K context..................355
custom signature, stream 256 context...............354
custom signature, stream 8K context.................355
custom signature, stream context........................354
custom signature, supported services................349
custom signature, TCP header matches.............357
custom signature, time binding..............................351
custom signature, UDP header matches...........358
custom, about..............................................................343
custom, extended information...............................345
custom, external references....................................345
custom, groups.............................................................363
custom, name and description..............................344
custom, target platform...........................................346
defined............................................................................835
DI profiles........................................................................337
local update..................................................................290
predefined.......................................................................337
updating.........................................................................289
using proxy............................................................292
updating predefined.........................................338, 342
viewing predefined......................................................337
attack pattern for custom attack object.....................352
attack pattern syntax..........................................................352
attack statistics...........................................................668, 677
Attacks by Severity (DI) report.........................................812
Attacks by Severity (Screen) report...............................813
Attacks over Time (DI) report...........................................812
Attacks over Time (Screen) report......................814, 829
audit log entries
filtering by cell................................................................791
migrating.........................................................................792
purging.............................................................................792
setting start time.........................................................792
Audit Log table
column information....................................................789
Audit Log Viewer
about...................................................................................27
defined............................................................................835
device updates, reviewing........................................252
using.................................................................................788
audit logs, permission to view............................................77
Audit-Log table
filtering..............................................................................791
managing.......................................................................790
selecting auditable activities..................................790
sorting..............................................................................790
authentication
configuring in firewall rules.......................................461
defined............................................................................835
NSM user..........................................................................68
authentication servers
backup servers.............................................................396
defined............................................................................836
objects.............................................................................395
RADIUS...........................................................................398
RADIUS example..........................................................401
959
Copyright © 2010, Juniper Networks, Inc.
Index
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...