rulebases
about................................................................................438
permissions......................................................................84
rules
about...............................................................................440
duplication......................................................................510
S
SA devices
See
Secure Access devices
scan manager, configuring in firewall rules................462
scans
detecting........................................................................502
other scans....................................................................503
port and network scans............................................502
TCP and UDP scans...................................................502
schedule objects
about................................................................................334
configuring in firewall rules.....................................458
schema
See
device schema
Screen reports...............................................................810, 813
ScreenOS clusters, adding.................................................153
ScreenOS devices
activating with dynamic IP address......................135
activating with static IP address.............................132
adding clusters..............................................................153
configuring features of...............................................194
importing with dynamic IP address.......................118
importing with static IP address..............................113
rapid deployment.........................................................139
supported platforms......................................................13
ScreenOS firmware
adjusting version on device.....................................269
upgrading.......................................................................266
ScreenOS policy name......................................................465
SCTP
Objects............................................................................395
searching for logs by ID......................................................768
searching in UI
about...................................................................................33
locating IP addresses...................................................36
locating patterns at the beginning of a
string...............................................................................34
locating patterns within a string...............................34
using regular expressions............................................35
Secure Access clusters
adding...............................................................................153
importing.........................................................................154
Secure Access devices
adding clusters..............................................................153
configuring features of...............................................196
importing clusters........................................................154
importing with dynamic IP address........................121
supported platforms....................................................20
Security Explorer
exporting data to HTML.............................................737
permissions....................................................................735
using...................................................................................731
usingt................................................................................734
views..................................................................................731
Security Monitor
about...................................................................................27
using.................................................................................709
security policies....................................................................435
about........................................................................28, 436
assigning to a device.................................................509
changing rule order......................................................515
cut, copy, paste....................................................515, 516
device policy pointers.................................................519
device-specific distribution.....................................667
exporting........................................................................520
importing devices with inactive policies............520
installing...............................................................468, 483
managing.........................................................................514
merging.....................................................................56, 518
permissions......................................................................85
reimporting.....................................................................518
rule groups.......................................................................517
rule shadowing..............................................................510
rulebases........................................................................438
rules..................................................................................440
session rematch............................................................513
templates.......................................................................447
updating...........................................................................513
validating.......................................................................509
validation tool..............................................................509
validation, rule duplication.......................................510
validation, rule shadowing........................................510
validation, unsupported options.............................511
validation, zone mismatch.......................................510
security policy
editing rules....................................................................776
object versions..............................................................776
security policy distribution, viewing.............................668
self log entries........................................................................749
self logs.....................................................................................743
Copyright © 2010, Juniper Networks, Inc.
972
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...