Redundant Routing Engines
configuring.....................................................................234
refreshing DNS entries on devices.................................299
regional server object..........................................................621
reimporting devices.............................................42, 100, 510
reimporting policies.............................................................510
reject action
changed to deny..........................................................504
configuring in firewall rules......................................447
rekey...........................................................................................573
remote authentication dial in user service
See
RADIUS
remote settings.....................................................................407
Report Manager
about..................................................................................26
using.................................................................................799
report time period, configuring........................................813
report types............................................................................799
reporting options on device
SNMP.................................................................................741
reports
Administrative..............................................................804
Attacks by Severity (DI)............................................802
Attacks by Severity (Screen)..................................803
Attacks over Time (DI)..............................................802
Attacks over Time (Screen)...................................804
AVT...................................................................................805
configuring options......................................................812
configuring time period..............................................813
count-based...................................................................812
DI.......................................................................................802
EX-Switch......................................................................806
FW/VPN..........................................................................801
Logs by User-set Flag......................................804, 816
naming..............................................................................812
Profiler.............................................................................805
Screen.............................................................................803
SSL/VPN........................................................................805
time-based.....................................................................812
Top Alarms.....................................................................801
Top Attackers (Screen)............................................804
Top Attacks (DI)..........................................................802
Top Attacks (Screen)................................................803
Top Configuration Changes .....................................817
Top Configuration Logs..............................................801
Top Information Logs................................................802
Top Rules.......................................................................804
Top Self Logs................................................................802
Top Targets (Screen)................................................804
Top Traffic Alarms.......................................................801
Top Traffic Log..............................................................801
Unified Access Control (UAC)...............................804
using to optimize rulebases.....................................816
using to track incidents..............................................815
resource statistics
device-specific view, described.............................658
viewing..............................................................................671
revocation checking..............................................................417
RFC 2138, RADIUS compatibility....................................393
role-based administration
about...................................................................................61
configuring.................................................................61, 66
creating administrators................................................67
creating roles....................................................................74
creating subdomains...................................................90
using effectively..............................................................63
using, enterprise organizations.................................63
using, service providers................................................65
roles
about...................................................................................74
assigning...........................................................................88
custom................................................................................74
dependant activities.....................................................75
permissions......................................................................75
root administrator, setting on device...........................300
Routing Engine
configuring.....................................................................234
rule groups, about................................................................436
rule options, configuring in firewall rules....................448
rule shadowing......................................................................503
rule title....................................................................................459
Rulebase
Exempt............................................................................484
rulebases
about................................................................................432
permissions......................................................................83
rules
about................................................................................434
duplication.....................................................................502
S
SA devices
See
Secure Access devices
scan manager, configuring in firewall rules................456
scans
detecting........................................................................495
other scans....................................................................495
port and network scans............................................495
TCP and UDP scans...................................................495
961
Copyright © 2010, Juniper Networks, Inc.
Index
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...