session limiting.....................................................................496
session rematch...................................................................505
session timeout, idle timeout...........................................391
Shared reports.....................................................................800
sign-in pages...........................................................................274
signature attack objects
BugTraq references......................................................341
creating ICMP header properties...........................353
custom.............................................................................343
CVE references..............................................................341
packet context.............................................................349
viewing flow properties.............................................350
viewing service binding.............................................345
SNMP
configuring on device..................................................741
creating communities................................................742
source NAT object..................................................................411
source NAT policy..................................................................531
source NAT, configuring in firewall rules.....................448
SRX Series clusters
activating..........................................................................157
adding...............................................................................155
configuring......................................................................233
importing.........................................................................156
modeling..........................................................................157
SRX Series devices
activating clusters.........................................................157
activating with dynamic IP address......................136
activating with static IP address............................134
adding clusters..............................................................155
adding multiple with discovery rules....................166
configuring......................................................................195
importing clusters........................................................156
importing with dynamic IP address.......................124
importing with static IP address..............................116
modeling clusters.........................................................157
supported platforms......................................................16
SSL VPN devices
See
Secure Access devices
SSL/UAC predefined log views.......................................748
SSL/VPN reports......................................................800, 805
SSP
for management connections...................................22
using to load firmware...............................................263
static NAT policy...................................................................539
statistics
Ethernet..........................................................................740
flow...................................................................................740
policy................................................................................740
status bar...................................................................................25
storing log files......................................................................784
stream 256 context for custom attack object..........350
stream context for custom attack object...................350
sub-categories, logs............................................................758
subdomains
about..........................................................................62, 90
permissions......................................................................84
subscriber tracing in GTP object.....................................381
subscription, activating......................................................285
Sun Remote Procedure Call (Sun-RPC).....................383
supernet, using in VPN.......................................................566
support, technical
See
technical support
SurfControl
integrated in firewall rules........................................454
redirect in firewall rules.............................................454
Web categories, predefined.....................................374
SYN-flood................................................................................491
system device-specific views..........................................658
system statistics, viewing...................................................671
system status monitor, permission to view..................85
T
tailing logs................................................................................757
target platform for custom attack object...................342
TCP
handshake......................................................................491
TCP header matches for custom attack
object....................................................................................352
TCP session close notification........................................458
technical overview..................................................................10
technical support
contacting JTAC............................................................xlix
template
validating........................................................................202
template operations directive..........................................215
template value icon...............................................................191
templates..................................................................................101
about........................................................................187, 196
applying...........................................................................199
applying multiple templates...................................202
benefits............................................................................196
configuration groups, using with...........................228
creating............................................................................198
default values...............................................................208
device groups...............................................................208
example of......................................................................198
exporting.........................................................................220
importing........................................................................220
limitations.......................................................................207
963
Copyright © 2010, Juniper Networks, Inc.
Index
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...