Archiving and Restoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Archiving Logs and Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Restoring Logs and Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
Managing Device Schemas Through the Juniper Update Mechanism . . . . . . . . . 314
Downloading Schemas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Downloading Schemas Using the NSM UI . . . . . . . . . . . . . . . . . . . . . . . 316
Downloading Schemas Using the GUI Server CLI . . . . . . . . . . . . . . . . . . 316
Applying a Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Part 3
Managing
Chapter 8
Configuring Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
About Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Using Objects Across Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Replacing Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Working with Unused Shared Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Searching for Unused Shared Objects . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Deleting an Unused Shared Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Working with Object Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Searching For and Deleting Duplicate Objects . . . . . . . . . . . . . . . . . . . . . . . 326
Configuring Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Viewing Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Creating Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Adding a Host Address Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Adding a Network Address Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Editing and Deleting Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Replacing Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Adding an Address Object Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Adding a Multicast Group Address Object . . . . . . . . . . . . . . . . . . . . . . . 330
Adding Static DNS Host Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Blocked Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Configuring Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Viewing Predefined Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Creating Custom Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Editing and Deleting Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Configuring Schedule Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Creating Schedule Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Configuring Access Profile Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Configuring Quality of Service Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Creating a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Deleting a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Editing a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Working with DI Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Viewing Predefined DI Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Viewing Attack Version Information for Attack Objects . . . . . . . . . . . . . . . . 338
Viewing Predefined DI Attack Object Groups . . . . . . . . . . . . . . . . . . . . . . . . 338
Updating Predefined DI Attack Objects and Groups . . . . . . . . . . . . . . . . . . . 338
Creating DI Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
xvii
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...