•
Groups—Group your devices by platform, OS version, location, or function, and then
add them to your security policies.
•
Zone Exceptions—To simplify your rules, define a common To Zone and From Zone
for all devices in the rule, and then specify zone exceptions to change the To and From
zones for specific devices. Zone exceptions add flexibility to your rules, enabling you
to manage more devices in a single rule.
•
Filtering—Filter on From and To Zones to see rules between zones.
•
Scheduling—Schedule a period during which a security policy is in effect on the devices
in a rule. Create schedule objects as one-time, recurring, or both.
•
Security and Protection—Configure a rule to look for attacks, viruses, or specific URLs.
•
Traffic Shaping—Use your firewall rules to control the amount of traffic permitted
through your managed devices.
Error Prevention, Recovery, and Auditing
Using NSM’s error prevention and recovery features, you can ensure that you are
consistently sending stable configurations to your devices, and that your device remains
connected to NSM. You can track each change made by a NSM administrator to help
you identify when, how, and what changes were made to your managed devices.
Device Configuration Validation
NSM alerts you to configuration errors while you work in the UI. Each field that has incorrect
or incomplete data displays an error icon:
Move your cursor over the icon to see details. For more details on validation, see
“Validation Icons in the User Interface” on page 31.
Policy Validation
The policy validation tool checks your security policies and alerts you to possible problems
before you install them on your managed devices.
Atomic Configuration and Updating
If the configuration deployment fails for any reason, the device automatically uses the
last installed stable configuration. If the configuration deployment succeeds, but the
device loses its connection to the management system, the device restores the last
installed configuration. This feature minimizes downtime and ensures that NSM always
maintains a stable connection to the managed device.
Your security devices can be updated atomically, which enables the device to receive
the entire modeled configuration (all commands) before executing those commands,
instead of executing commands as they are received from the management system.
Because the device no longer needs to maintain a constant connection to the
management system during updating, you can configure changes to management
connection from the NSM UI.
7
Copyright © 2010, Juniper Networks, Inc.
Chapter 1: Introduction to Network and Security Manager
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...