DMZ-Dual-Untrust port mode........................................109
DNS
defined............................................................................829
refreshing entries.........................................................299
domain
setting a Log Viewer filter for..................................760
domains
about...................................................................................61
defined............................................................................829
global domain login.......................................................74
viewing domain details...............................................90
downed device
e-mail notification......................................................786
DSCP class selector............................................................450
Dual Routing Engines
configuring.....................................................................234
Dual-Untrust port mode....................................................106
E
e-mail notification
downed device.............................................................786
Endpoint Security Assessment Plug-ins.....................276
entitlement
See
subscription
error icon....................................................................................191
ESAP
See
Endpoint Security Assessment Plug-ins
ethernet statistics
device-specific view, described.............................658
Ethernet statistics................................................................740
viewing............................................................................665
Ethernet statistics, viewing..............................................665
events
atomic updating............................................................741
EX Series devices
activating with dynamic IP address......................136
activating with static IP address............................134
adding multiple with discovery rules....................166
configuring......................................................................195
importing with dynamic IP address.......................124
importing with static IP address..............................116
supported switches.......................................................19
EX Series switch predefined log views..........................747
EX Switch reports................................................................800
EX-Switch reports...............................................................806
Exempt Rulebase
Adding.............................................................................484
exempt rulebase
adding to security policy..........................................484
exempt rules
configuring attacks.....................................................485
configuring from the Log Viewer...........................486
configuring match columns....................................485
configuring source and destination.....................485
entering comments...................................................486
expanded VPN view..................................................544, 576
exporting log entries
from device.....................................................................733
from device to e-mail.................................................735
from device to NSM....................................................736
from device to SNMP..................................................741
from device to syslog..................................................742
from device to WebTrends.......................................743
from device, self log entries.....................................735
from GUI Server to CSV.............................................787
from GUI Server to e-mail........................................788
from GUI Server to script..........................................789
from GUI Server to SNMP.........................................787
from GUI Server to syslog.........................................787
from GUI Server to XML............................................788
from GUI Server, about..............................................786
from log2action to CSV...................................793, 794
from log2action to e-mail........................................795
from log2action to script...........................................797
from log2action to SNMP.........................................794
from log2action to syslog.........................................796
from log2action to XML.............................................793
exporting security policies.................................................513
extended information for custom attack
object.....................................................................................341
extended port mode.....................................................114, 119
external references for custom attack object............341
external user groups...........................................................400
external users........................................................................556
extranet devices
adding...............................................................................150
F
failover
forcing on device interface.......................................301
false positive setting...........................................................343
filter
VPN...................................................................................681
filtering logs using ranges..................................................760
filters
negation..........................................................................758
setting a byte range filter...........................................761
setting a category filter..............................................758
953
Copyright © 2010, Juniper Networks, Inc.
Index
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...