DMZ-Dual-Untrust port mode........................................109
DNS
defined............................................................................839
refreshing entries.........................................................303
domain
setting a Log Viewer filter for...................................770
domains
about...................................................................................61
defined............................................................................839
global domain login.......................................................75
viewing domain details.................................................91
downed device
e-mail notification......................................................796
DSCP class selector............................................................456
Dual Routing Engines
configuring.....................................................................236
Dual-Untrust port mode....................................................106
E
e-mail notification
downed device.............................................................796
Endpoint Security Assessment Plug-ins....................280
entitlement
See
subscription
error icon...................................................................................193
ESAP
See
Endpoint Security Assessment Plug-ins
ethernet statistics
device-specific view, described............................668
Ethernet statistics................................................................750
viewing.............................................................................675
Ethernet statistics, viewing...............................................675
events
atomic updating............................................................751
EX Series devices
activating with dynamic IP address......................136
activating with static IP address............................134
adding multiple with discovery rules....................168
configuring.......................................................................197
importing with dynamic IP address.......................125
importing with static IP address..............................116
supported switches.......................................................19
EX Series switch predefined log views..........................757
EX Switch reports.................................................................810
EX-Switch reports................................................................816
Exempt Rulebase
Adding..............................................................................492
exempt rulebase
adding to security policy...........................................492
exempt rules
configuring attacks.....................................................493
configuring from the Log Viewer...........................493
configuring match columns.....................................492
configuring source and destination......................492
entering comments....................................................493
expanded VPN view..................................................552, 585
exporting log entries
from device.....................................................................743
from device to e-mail.................................................745
from device to NSM....................................................746
from device to SNMP..................................................751
from device to syslog..................................................752
from device to WebTrends.......................................753
from device, self log entries.....................................745
from GUI Server to CSV.............................................798
from GUI Server to e-mail........................................798
from GUI Server to script..........................................799
from GUI Server to SNMP.........................................797
from GUI Server to syslog.........................................797
from GUI Server to XML............................................798
from GUI Server, about..............................................796
from log2action to CSV..................................803, 804
from log2action to e-mail.......................................805
from log2action to script..........................................807
from log2action to SNMP........................................804
from log2action to syslog........................................806
from log2action to XML............................................803
exporting security policies................................................520
extended information for custom attack
object....................................................................................345
extended port mode....................................................115, 120
external references for custom attack object...........345
external user groups...........................................................405
external users........................................................................564
extranet devices
adding................................................................................151
F
failover
forcing on device interface......................................305
false positive setting...........................................................348
filter
VPN...................................................................................691
filtering logs using ranges..................................................770
filters
negation..........................................................................768
setting a byte range filter............................................771
setting a category filter..............................................768
963
Copyright © 2010, Juniper Networks, Inc.
Index
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...