Chapter 6
Updating Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Table 27: Additional Configuration States for Devices Running ScreenOS 5.1 and
Later . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Table 28: Delta Configuration Summary Information . . . . . . . . . . . . . . . . . . . . . . 254
Table 29: Device States During Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Chapter 7
Managing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Table 30: Scheduled Security Update (SSU) Command Line Parameters . . . . . 297
Part 3
Managing
Chapter 8
Configuring Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Table 31: Application Table Tab Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Table 32: Deep Inspection Profile Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
Table 33: Deep Inspection IP Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Table 34: IP Protocol Name and Type Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . 348
Table 35: Supported Services for Service Bindings . . . . . . . . . . . . . . . . . . . . . . . 349
Table 36: Attack Pattern Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Table 37: Attack Pattern Syntax Example Matches . . . . . . . . . . . . . . . . . . . . . . . 353
Table 38: DI Attack Header Match Modifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
Table 39: Service Table Tab Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Table 40: Group Expression Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Table 41: Source NAT Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Table 42: Destination NAT Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . 420
Chapter 9
Configuring Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Table 43: IDP Rule Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Table 44: Severity Levels, Recommended Actions and Notifications . . . . . . . . . 476
Table 45: APE Rule Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Table 46: Actions for Backdoor Rule: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Table 47: Rule Shadowing Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Table 48: Polymorphic Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Part 4
Monitoring
Chapter 17
Realtime Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Table 49: Device Status Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661
Table 50: Device Polling Intervals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664
Table 51: Device Detail Status Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
Table 52: Device Statistics Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 666
Table 53: Device-Specific Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Table 54: Policy Distribution Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
Table 55: Protocol Distribution Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670
Table 56: VPN Monitor Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672
Table 57: Active VPN Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674
Table 58: Ethernet Statistics View Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 675
Table 59: Flow Statistics View Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
Table 60: Attack Counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
Table 61: Resource Statistics Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681
Table 62: Administrators View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
Copyright © 2010, Juniper Networks, Inc.
xlii
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...