Table 16: Predefined NSM Administrator Activities
(continued)
Description
Task
Function
View
Channel
This activity enables an administrator to generate predefined and shared
historical log reports using the guiSvrCli command utility.
N/A
CLI-based Reports
This activity enables an administrator to update the attack object
database on the NSM system using guiSvrCli command utility.
N/A
CLI-based Security Update
Verifies the configuration status of the device.
Check
Config Sync Status
A configlet is a small, static configuration file that contains information
on how a security device can connect to NSM.
View
Configlet
A Certificate Revocation List (CRL) identifies invalid certificates. You can
obtain a CRL file (
.crl
) from the CA that issued the local certification and
CA certificate for the device, and then use this file to create a Certificate
Revocation List object.
Create
Delete
Edit
View
CRLs
Enables add, delete, or viewing of custom troubleshooting commands
available through the Device Manager for troubleshooting devices. Custom
troubleshooting commands are in addition to the standard device
troubleshooting commands
debug
,
exec
, and
get
.
Edit
View
Custom Troubleshoot
Commands
Known targets and sources of attacks or suspected targets and sources
of attacks can be added to source or destination watch lists. The
Dashboard is a near-real time monitor of watch lists of known targets
and sources of attacks and the top 10 attacks within the previous hour.
View
Dashboard
These activities allow an administrator to manage the database snapshot
feature that provides versioning of NSM objects, policies, and managed
devices.
Create
Delete
Edit
View
Database Versions
Deep Inspection is a mechanism for filtering traffic that a security device
permits. You can enable Deep Inspection in firewall rules to examine
permitted traffic and take specific actions if the DI module finds matching
attack signatures or protocol anomalies.
This activity enables a system administrator to view or set the deep
inspection package that is loaded on the device.
Edit
View
Deep Inspection Pack
Selection
Device administrators have permissions to administer the devices through
the CLI or UI for the device itself. Importing a device administrator allows
that administrator to use the NSM UI.
Import
Device Admins
77
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring Role-Based Administration
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...