device firmware
adjusting version.........................................................269
permission to update....................................................79
device groups
adding...............................................................................182
permissions.....................................................................80
planning for..............................................................55, 181
using..................................................................................182
device inventory
comparing.......................................................................273
reconciling.......................................................................272
viewing.............................................................................272
device log cleanup...............................................................793
device log comments, permission to update...............79
device log flags, permission to update...........................79
device logs, permissions.......................................................79
Device Manager
about...................................................................................27
Device Monitor
alarm status..................................................................664
device status information.......................................660
device passwords, permission to view............................79
device policy pointers..........................................................519
device polling interval........................................................663
device reboot, permission....................................................79
device references, finding..................................................307
device running config, permission to view.....................79
device schemas
about...................................................................................22
applying............................................................................317
downloading...................................................................315
managing.........................................................................314
viewing.............................................................................707
Device Server
about....................................................................................12
permissions......................................................................85
processes...........................................................................13
device software keys, permission to install..................79
device status..........................................................................249
device status monitor, permission to view....................79
device templates
See
templates
device traffic distribution, viewing................................668
device update, errors...........................................................262
device-specific VPN information, viewing.................693
devices
activating with dynamic IP address......................135
activating with static IP address.............................132
adding multiple with CSV file..................................169
adding multiple with discovery rules....................168
configuring.......................................................................187
EX Series, activating...........................................134, 136
EX Series, importing............................................116, 125
extranet, adding.............................................................151
IDP sensors, activating...............................................135
IDP, activating................................................................133
IDP, importing........................................................115, 120
importing..................................................................101, 112
importing with dynamic IP address.......................118
importing with static IP address..............................113
Infranet Controller, importing....................................121
J Series, activating...............................................134, 136
J Series, importing................................................116, 125
Junos, activating..................................................134, 136
Junos, importing....................................................116, 125
M Series, activating.............................................134, 136
M Series, importing..............................................116, 125
modeling.................................................................101, 130
MX Series, activating..........................................134, 136
MX Series, importing...........................................116, 125
port mode.......................................................................104
ScreenOS, activating..........................................132, 135
ScreenOS, importing............................................113, 118
Secure Access, importing...........................................121
SRX Series, activating........................................134, 136
SRX Series, importing.........................................116, 125
status of..........................................................................249
updating...........................................................................145
verifying............................................................................128
vsys, adding.....................................................................147
vsys, importing..............................................................148
vsys, modeling...............................................................149
devices, configuring in firewall rules.............................453
devices, reimporting.............................................................518
DI
See
Deep Inspection
DI profiles
creating...........................................................................338
DI reports.........................................................................810, 812
dial backup
configuring for route-based VPN
member.......................................................................573
enabling in VPN Manager.........................................570
Diffie-Hellman Group.........................................................429
DIPs
global objects................................................................415
directive
defined............................................................................839
discovery rules........................................................................168
display filter............................................................................692
Copyright © 2010, Juniper Networks, Inc.
962
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...