•
VPN rules or VPN links
•
Rules that manage traffic from a specific zone or interface on the security device
•
Rules for a specific device or device group
•
Rules that provide attack or AV protection
•
Rules that manage VoIP traffic with GTP objects
You can add, edit, and delete rule groups; however, deleting a rule group also deletes all
rules within that group. If necessary, you can also ungroup a rule group.
You can create multiple rule groups (40,000 rules maximum in a security policy). NSM
supports one level of rule groups; you cannot create a rule group within a rule group.
Reimporting Devices and Security Policies
Occasionally, you might need to delete and then again add a security device to NSM.
After you reimport the device configuration for a device that was previously managed by
NSM:
•
If you made no changes to the device policies using the WebUI or CLI, when you reimport
the device, NSM does not create a new security policy.
•
If you made changes to the devices policies using the WebUI or CLI, when you reimport
the device, NSM creates a new security policy.
You must manually reassign a policy to a reimported device. For example, if you reimport
a previously-managed security device, you might want to first merge the imported policy
with a more comprehensive policy, then assign the comprehensive policy to the device.
NOTE:
Importing the running configuration from a device completely
overwrites all configuration information stored within NSM for that device.
To help avoid accidental configuration overwriting, when you attempt to
import a configuration from a currently managed security device, NSM
prompts you for confirmation.
Merging Policies
When you import policies from a single managed device, those policies appear in NSM
as rules in a new policy. Each device policy is imported as a single rule, and the rules make
up the policy that exists on the device.
NOTE:
In the ScreenOS WebUI and CLI, a security policy is a single statement
that defines a source, destination, zone, direction, and service. In NSM, those
same statements are known as rules, and a security policy is a collection of
rules.
To simplify policy management and maintenance, you can merge two policies into a
single security policy. To merge two policies, select a source policy and a target policy:
Copyright © 2010, Juniper Networks, Inc.
518
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...