Backing up multiple SA or IC Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Configuring Preferences for Backing up and Restoring SA or IC Devices . . . . 281
Viewing Backed up Versions for an SA or IC Device . . . . . . . . . . . . . . . . . . . . 282
Setting the RMA State on an SA/IC Device . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Activating an SA/IC Device Set to the RMA State . . . . . . . . . . . . . . . . . . . . . 283
Performing a Full Restore of an SA or IC Device . . . . . . . . . . . . . . . . . . . . . . 284
Managing User Sessions for SA and IC Devices . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Activating Subscription Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Managing the Attack Object Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Updating the Attack Object Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
Updating Attack Objects for IDP-Enabled devices . . . . . . . . . . . . . . . . 286
Updating DI Attacks on ScreenOS 5.0 Devices . . . . . . . . . . . . . . . . . . . 288
Using Updated Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Verifying the Attack Object Database Version . . . . . . . . . . . . . . . . . . . . . . . 289
Automatic Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Manual Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Managing Different Attack Database Versions . . . . . . . . . . . . . . . . . . . 290
Example: Updating Devices with Different Attack Object Database
Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Updating the IDP Detector Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Example: Confirm IDP Engine Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Scheduling Security Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Example: Update Attack Objects and Push to Connected Devices . . . 294
Scheduling the Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Example: Using Crontab to Schedule Attack Updates . . . . . . . . . . . . . 295
Viewing Scheduled Security Updates in the Job Manager . . . . . . . . . . . 296
Viewing Scheduled Security Updates in the Audit Log Viewer . . . . . . . 296
Updating AV Pattern Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Updating the Web Category List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Miscellaneous Device Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Launching a Web UI for a Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Launching a Telnet CLI Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Rebooting Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Refreshing DNS Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Updating the Device Clock with an NTP Server . . . . . . . . . . . . . . . . . . . . . . 299
Setting the Root Administrator on a Device . . . . . . . . . . . . . . . . . . . . . . . . . 300
Failing Over or Reverting Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Setting the RMA State on a Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Upgrading the OS Version During an RMA-Activate Device Workflow . . . . . 302
Troubleshooting a BGP Peer Session on a Device . . . . . . . . . . . . . . . . . . . . . 302
Reactivating Wireless Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Finding Usages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Managing ScreenOS Device Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Abstract Data Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Data Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Data Model Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Data Model Updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Data Model Importing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Copyright © 2010, Juniper Networks, Inc.
xvi
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...