schedule objects
about................................................................................330
configuring in firewall rules......................................452
schema
See
device schema
Screen reports............................................................800, 803
ScreenOS clusters, adding.................................................152
ScreenOS devices
activating with dynamic IP address......................135
activating with static IP address.............................132
adding clusters..............................................................152
configuring features of...............................................192
importing with dynamic IP address.......................118
importing with static IP address..............................113
rapid deployment.........................................................138
supported platforms......................................................13
ScreenOS firmware
adjusting version on device.....................................265
upgrading........................................................................262
ScreenOS policy name......................................................459
SCTP
Objects............................................................................390
searching for logs by ID......................................................758
searching in UI
about...................................................................................33
locating IP addresses...................................................36
locating patterns at the beginning of a
string...............................................................................34
locating patterns within a string...............................34
using regular expressions............................................35
Secure Access clusters
adding...............................................................................152
importing.........................................................................154
Secure Access devices
adding clusters..............................................................152
configuring features of...............................................194
importing clusters........................................................154
importing with dynamic IP address........................121
supported platforms....................................................20
Security Explorer
exporting data to HTML.............................................727
permissions....................................................................725
using...................................................................................721
usingt................................................................................724
views..................................................................................721
Security Monitor
about...................................................................................27
using.................................................................................699
security policies....................................................................429
about........................................................................28, 430
assigning to a device...................................................501
changing rule order....................................................508
cut, copy, paste............................................................508
device policy pointers..................................................511
device-specific distribution.....................................657
exporting..........................................................................513
importing devices with inactive policies..............513
installing................................................................462, 476
managing........................................................................507
merging......................................................................56, 511
permissions......................................................................84
reimporting.....................................................................510
rule groups......................................................................510
rule shadowing.............................................................503
rulebases.........................................................................432
rules..................................................................................434
session rematch..........................................................505
templates........................................................................441
updating.........................................................................505
validating........................................................................502
validation tool...............................................................502
validation, rule duplication......................................502
validation, rule shadowing.......................................503
validation, unsupported options...........................504
validation, zone mismatch......................................502
security policy
editing rules...................................................................766
object versions..............................................................766
security policy distribution, viewing..............................658
self log entries........................................................................739
self logs.....................................................................................733
Server Manager
using.................................................................................687
Server Manager module........................................................31
service binding
selecting for custom attack object.......................343
supported services......................................................345
service objects
about................................................................................382
configuring in firewall rules.....................................446
custom............................................................................384
MS-RPC..........................................................................384
Sun-RPC.........................................................................383
session display filter
configuring......................................................................674
session filter
active sessions, viewing............................................673
Copyright © 2010, Juniper Networks, Inc.
962
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...