P
packet context......................................................................349
packet data
managing in logs..........................................................743
viewing in logs...............................................................745
pattern file, updating on device......................................296
perfect forward secrecy.....................................................424
permit action, configuring in firewall rules.................446
policies
Junos NAT........................................................................531
security policies..............................................................511
policy name, ScreenOS.....................................................459
policy statistics.....................................................................740
policy validation tool..........................................................502
policy version..........................................................................514
polymorphic objects............................................................522
port mode
about................................................................................104
changing.............................................................................111
Combined.......................................................................106
DMZ-Dual-Untrust......................................................109
Dual-Untrust..................................................................106
Home-Work....................................................................105
Trust-Untrust.................................................................105
Trust-Untrust-DMZ......................................................107
Trust/Untrust/DMZ (Extended)............................108
port number range filter
setting...............................................................................761
port scanning.........................................................................495
pre/post rules.........................................................................519
predefined entities in templates....................................208
Predefined log views...........................................................749
predefined reports
generating......................................................................807
predefined views...................................................................747
preferred ID, configuring in firewall rules.....................453
prerules and postrules........................................................519
preview tools..........................................................................248
primary interface, fail over.................................................301
priority levels for traffic shaping.....................................450
Profiler
alerts................................................................................704
configuring.....................................................................702
configuring permitted objects................................709
context profiles.............................................................703
customizing preferences..........................................705
data viewer..........................................................708, 709
filtering and sorting......................................................712
MAC/view area..............................................................715
operations on devices without IDP rules............705
setting up.........................................................................701
settings............................................................................702
starting............................................................................705
stopping..........................................................................705
time intervals..................................................................713
updating settings........................................................704
using.................................................................................699
profiler
using for keeping networks current........................717
using for network baseline.........................................717
using for stopping worms and trojans..................719
Profiler DB
accessing records in....................................................720
purging records..............................................................716
Profiler reports...........................................................800, 805
Profiler views
about................................................................................706
using...................................................................................712
protected resources....................................................421, 555
protocol anomaly attack objects, custom..................353
protocol distribution...........................................................740
device-specific view, described.............................657
viewing............................................................................660
protocol filter
setting..............................................................................759
Protocol Profiler view..........................................................707
R
RADIUS
authentication of NSM users....................................68
authentication server example..............................396
authentication servers...............................................393
compatibility with RFC 2138...................................393
ranges.......................................................................................760
rapid deployment
deploying many devices.............................................177
overview...............................................................................6
using..................................................................................138
RD
See
rapid deployment
re-importing devices...........................................................244
reachable workflow
activating device...........................................................132
importing device............................................................113
Realtime Monitor
about..................................................................................26
using.................................................................................649
views................................................................................650
Copyright © 2010, Juniper Networks, Inc.
960
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...