Table 16: Predefined NSM Administrator Activities
(continued)
Description
Task
Function
A device running config is a report that details the device configuration
running on the physical device.
View
Device Running Config
When setting up the NetScreen-5GT Wireless (ADSL) device as a wireless
access point (WAP), this activity enables an administrator to scan the
broadcast vicinity to see if there are any other WAPs broadcasting nearby.
N/A
Device Site Survey
A device software key provides, enhances, or adds functionality for a
managed device.
Install
Device Software Keys
The device status monitor tracks the status of devices, VPN tunnels, and
NSRP.
View
Device Status Monitor
The device URL category list contains predefined Web categories used
in Web filtering profiles. You can update the device Web category list
from the system Web category list.
Update
Device UrlCategory
A device is a managed device.
A device group is a collection of managed devices.
A template is a device configuration that contains predefined, static
configuration information, such as networking settings, interface settings,
or DNS settings.
View
Create
Edit
Delete
Devices, Device Groups, and
Templates
Deep Inspection (DI) attack objects contain attack patterns and protocol
anomalies for known attacks and unknown attacks that attackers can
use to compromise your network. However, DI attack objects don’t work
on their own—they need to be part of an attack object group and a DI
Profile object before you can use them in a firewall rule to detect known
attacks and prevent malicious traffic from entering your network.
Create
Delete
Edit
View
DI Objects
Extranet policies enable you to configure and manage third-party routers.
Create
Delete
Edit
View
Extranet Policy Objects
Use Dial-in objects to dial-in and manage a device as a console. You can
create and edit lists of allowed numbers and lists of blocked numbers
and set a policy for unknown CNIDs.
Create
Delete
Edit
View
Dial-in Objects
Use failover to enable the device to switch traffic from the primary
interface to the backup interface, and from the backup to the primary
when both primary and backup interfaces are bound to the Untrust zone.
N/A
Failover Device
79
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring Role-Based Administration
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...