rapid deployment
deploying many devices............................................180
overview...............................................................................6
using..................................................................................139
RD
See
rapid deployment
re-importing devices...........................................................248
reachable workflow
activating device...........................................................132
importing device............................................................113
Realtime Monitor
about..................................................................................26
using.................................................................................659
views................................................................................660
Redundant Routing Engines
configuring.....................................................................236
refreshing DNS entries on devices.................................303
regional server object..........................................................631
reimporting devices.............................................43, 100, 518
reimporting policies.............................................................518
reject action
changed to deny............................................................511
configuring in firewall rules......................................453
rekey...........................................................................................581
remote authentication dial in user service
See
RADIUS
remote settings......................................................................413
Report Manager
about..................................................................................26
using................................................................................809
report time period, configuring.......................................823
report types...........................................................................809
reporting options on device
SNMP.................................................................................751
reports
Administrative...............................................................814
Attacks by Severity (DI).............................................812
Attacks by Severity (Screen)...................................813
Attacks over Time (DI)...............................................812
Attacks over Time (Screen).....................................814
AVT....................................................................................815
configuring options.....................................................822
configuring time period.............................................823
count-based..................................................................823
DI.........................................................................................812
EX-Switch.......................................................................816
FW/VPN............................................................................811
Logs by User-set Flag.......................................814, 826
naming.............................................................................822
Profiler..............................................................................815
Screen...............................................................................813
SSL/VPN.........................................................................815
time-based....................................................................823
Top Alarms.......................................................................811
Top Attackers (Screen).............................................814
Top Attacks (DI)............................................................812
Top Attacks (Screen)..................................................813
Top Configuration Changes ....................................828
Top Configuration Logs...............................................811
Top Information Logs..................................................812
Top Rules.........................................................................814
Top Self Logs..................................................................812
Top Targets (Screen)..................................................814
Top Traffic Alarms.........................................................811
Top Traffic Log................................................................811
Unified Access Control (UAC).................................814
using to optimize rulebases.....................................827
using to track incidents.............................................826
resource statistics
device-specific view, described............................668
viewing.............................................................................681
revocation checking.............................................................423
RFC 2138, RADIUS compatibility....................................398
role-based administration
about...................................................................................61
configuring.................................................................61, 66
creating administrators................................................67
creating roles....................................................................75
creating subdomains.....................................................91
using effectively..............................................................63
using, enterprise organizations.................................63
using, service providers................................................65
roles
about...................................................................................75
assigning...........................................................................89
custom................................................................................75
dependant activities.....................................................75
permissions......................................................................76
root administrator, setting on device...........................304
Routing Engine
configuring.....................................................................236
rule groups, about................................................................442
rule options, configuring in firewall rules....................454
rule shadowing.......................................................................510
rule title....................................................................................465
Rulebase
Exempt............................................................................492
971
Copyright © 2010, Juniper Networks, Inc.
Index
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...