background image

Table 7: Related NSM Documentation

(continued)

Description

Document

Describes how to use and configure key management features in the NSM. It
provides conceptual information, suggested workflows, and examples where
applicable. This guide is best used in conjunction with the NSM Online Help,
which provides step-by-step instructions for performing management tasks
in the NSM UI.

This guide is intended for application administrators or those individuals
responsible for owning the server and security infrastructure and configuring
the product for multi-user systems. It is also intended for device configuration
administrators, firewall and VPN administrators, and network security operation
center administrators.

Network and Security Manager
Administration Guide

Provides task-oriented procedures describing how to perform basic tasks in
the NSM user interface. It also includes a brief overview of the NSM system
and a description of the GUI elements.

Network and Security Manager Online Help

Getting Help

If you need additional information or assistance, contact Juniper Networks Technical
Assistance Center (JTAC) by E-mail ([email protected]) or telephone (1-888-314-JTAC
within the United States or 1-408-745-9500 from outside the United States).

Copyright © 2009, Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper
Networks logo, JUNOS, NetScreen, ScreenOS, and Steel-Belted Radius are registered
trademarks of Juniper Networks, Inc. in the United States and other countries. JUNOSe
is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered
trademarks, or registered service marks are the property of their respective owners. Juniper
Networks assumes no responsibility for any inaccuracies in this document. Juniper
Networks reserves the right to change, modify, transfer, or otherwise revise this publication
without notice. Products made or sold by Juniper Networks or components thereof might
be covered by one or more of the following patents that are owned by or licensed to
Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650,
6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918,
6,567,902, 6,578,186, and 6,590,785.

Copyright © 2011, Juniper Networks, Inc.

22

Juniper Networks Intrusion Detection and Prevention Release Notes

Содержание IDP OS 5.1R1

Страница 1: ...4 Supported Upgrade Paths 5 Downgrading or Reverting 6 Licensing 6 Compatibility with Network and Security Manager 6 Compatibility with Juniper Networks Infranet Controller 7 Browser Requirements 7 Up...

Страница 2: ...r from the primary path to the backup path in cases of failure For details see IDP Series Deployment Scenarios High availability Beginning in IDP OS Release 5 1 you can operate the IDP Series device i...

Страница 3: ...ication Beginning with IDP OS Release 5 1 You can create rules that match extended application objects also called nested application objects You can apply a new action to matching rules DiffServ Rate...

Страница 4: ...0 10 gigabyte fiber interfaces do not support interface signaling or peer port modulation Also not supported in IDP OS Release 5 0 x Authentication to the ACM via RADIUS with RSA SecurID authenticatio...

Страница 5: ...hanges to files and directories you will notice when you upgrade Table 2 Changes to Files and Directories Files and Directories Upgrade Path No changes to attend to before upgrade From 5 0r2 Before yo...

Страница 6: ...s no longer supported in IDP 5 1 The upgrade process saves a backup of your previous usr idp device bin user_funcs file but installs a new user_funcs file in order to provide appropriate content for I...

Страница 7: ...Start utility and IDP Reporter have been tested on the following browsers Internet Explorer 7 x 6 x Firefox 3 x 2 x Upgrading IDP Software During upgrade the IDP Series appliance is gracefully shut do...

Страница 8: ...password b Enter the IDP Series device serial number to display a view of applicable software releases available for download c Click the applicable link to display the software download page d Downlo...

Страница 9: ...the BIOS setting Console redirection Continue Console redirection after POST to ON To resolve this issue press the Delete key to enter BIOS and set this option to OFF Next Steps If you are upgrading...

Страница 10: ...vailable for download c Click the applicable link to display the software download page d Save the sensor_version sh file where version is the number that identifies the software release version 2 Con...

Страница 11: ...r2 skip this step You completed it when you upgraded to IDP 5 0 If you are upgrading from IDP OS Release 4 1r4 1 a Run through the ACM wizard to reconfigure your virtual routers In IDP 5 0 and later y...

Страница 12: ...O modules 308133 Unexpected Behavior Resolved an issue where the SYN Protector rulebase had failed to reset the destination server connections when configured in Passive mode 417818 Resolved an issue...

Страница 13: ...s reached In this release we have changed the delay threshold from 1024 to 100 instances 388321 Syslog NIC state events reported in syslog messages had not indicated that the virtual router has return...

Страница 14: ...ith APE rules would eventually result in policy push errors 494931 Resolved an issue where running sciocpu utilization command in single core platforms caused a drop in throughput and increase in late...

Страница 15: ...uters page should not display the user interface group for NIC State When no installed I O module supports bypass NIC state is non configurable 286327 ACM does not reject poorly formed alias names In...

Страница 16: ...uplex settings match We have observed traffic dropping if the IDP Series interfaces are configured as 100 10 1000 half full duplex AUTO OFF and the peer switch or firewall is configured as AUTO ON 431...

Страница 17: ...ata1 00 cmd 61 30 08 8d 6e 16 00 00 00 00 00 40 tag 1 cdb 0x0 data 24576 out res 50 00 38 a5 70 16 00 00 00 00 00 40 Emask 0x2 HSM violation You can safely ignore these messages 288824 During upgrade...

Страница 18: ...ted in syslog messages do not indicate which IDP engine restarted 427100 Database limit exceeded alert log are not displayed in Profiler logs 429086 We have observed a minor loss of application volume...

Страница 19: ...3 rxBytes 14757418499789 rxOverflow 0 rxQueued 0 txComplete 18487802326 txCompleteBytes 14691015670286 allocQueueSize 1023 txPackets 18487802326 txBytes 14692307273740 Device Id 0 eth2 Stats Link Stat...

Страница 20: ...hutdown Operation The shutdown h now command might not behave as expected if you deploy IDP8200 with any of the following fiber I O modules IDP 1GE 4SX BYP IDP 10GE 2XFP or IDP 10GE 2SR BYP Instead of...

Страница 21: ...scribes how to use IDP Reporter an on box reporting platform that includes predefined reports on attack detection and application usage You can also use IDP Reporter to schedule regular publication of...

Страница 22: ...act Juniper Networks Technical Assistance Center JTAC by E mail support juniper net or telephone 1 888 314 JTAC within the United States or 1 408 745 9500 from outside the United States Copyright 2009...

Отзывы: