Configuring Custom Policy Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Defining Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Instantiating New Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Adding Custom Detail Object to Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Open Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Configuring GTP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Configuring Info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Limiting GTP Message Length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Limiting GTP Message Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Limiting GTP Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Removing Inactive GTP Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Validating Sequence Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Filtering GTP-in-GTP Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Removing GTP R6 Informational Elements . . . . . . . . . . . . . . . . . . . . . . 383
Inspecting Tunnel Endpoint IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Configuring Traffic Logging and Counting . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Traffic Counting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Traffic Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Configuring IMSI Prefix and APN Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Creating an APN Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Creating an IMSI Prefix Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Configuring GTP Message Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Configuring Subscriber Tracing (Lawful Interception) . . . . . . . . . . . . . . . . . 386
Example: Creating a GTP Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Configuring Service Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Viewing Predefined Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
Creating Custom Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Service Object Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Example: Creating a Custom Service and Group . . . . . . . . . . . . . . . . . . 391
Example: Creating a Custom Sun-RPC Service . . . . . . . . . . . . . . . . . . . 392
Example: Creating a Custom MS-RPC Service . . . . . . . . . . . . . . . . . . . . 393
Editing and Deleting Service Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Replacing Service Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Configuring SCTP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Configuring an SCTP Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Configuring Authentication Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Configuring General Authentication Server Settings . . . . . . . . . . . . . . . . . . 396
Configuring Authentication Server Redundancy . . . . . . . . . . . . . . . . . . . . . . 396
Configuring Authentication for User Types . . . . . . . . . . . . . . . . . . . . . . . . . . 397
Domain Name Checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
Domain Name Stripping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
Configuring Authentication Server Types . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
Configuring a RADIUS Authentication Server . . . . . . . . . . . . . . . . . . . . 398
Configuring a SecurID Authentication Server . . . . . . . . . . . . . . . . . . . . . 402
Configuring an LDAP Authentication Server . . . . . . . . . . . . . . . . . . . . . 403
Configuring a TACACS Authentication Server . . . . . . . . . . . . . . . . . . . . 404
Configuring User Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Configuring Local Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Configuring Local User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
xix
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...