Table 16: Predefined NSM Administrator Activities
(continued)
Description
Task
Function
Allows an administrator to create polymorphic address objects.
Polymorphic objects can be used as place holders for values that will be
defined in a different context (in a regional server domain or subdomain,
for instance).
Create
Polymorphic Address Objects
Allows an administrator to create polymorphic service objects.
Polymorphic objects can be used as place holders for values that will be
defined in a different context (in a regional server domain or subdomain,
for instance).
Create
Polymorphic Service Objects
Allows an administrator to edit post domain policy.
Edit
Post Domain Policies
Allows an administrator to edit pre domain policy.
Edit
Pre Domain Policies
Enables an administrator to view the Profiler.
View
Profiler
Enables an administrator to purge or clear data in the ProfilerDB.
Purge
Clear
Profiler Data
Allows an administrator to manage a remote settings object that defines
the DNS and WINS servers that are assigned to L2TP RAS users after
they have connected to the L2TP tunnel. You can use remote settings
objects in an L2TP VPN, and when configuring a local user on a specific
device.
Create
Delete
Edit
View
Remote Settings
Use a routing instance object to share routing instances in the Radius
server & LDAP server configurations within the access profile object. A
routing instance object is a polymorphic object (similar to zone objects)
that maintains the mapping between the actual routing instance and the
device in which it is created.
Create
Delete
Edit
View
Routing Instance Object
A rulebase in a security policy contains rules that manage specific types
of traffic passing through the managed device. These activities enable
an administrator to delete a rulebase.
Delete
Rulebases
N/A
Run Online Retention
Command
Allows an administrator to run the Security Explorer—a graphical tool
that enables you to visualize and correlate network behavior based on
data collected in the Profiler, Log Viewer, and Report Manager.
View
Security Explorer
83
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring Role-Based Administration
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...