Archiving and Restoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Archiving Logs and Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Restoring Logs and Configuration Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Managing Device Schemas Through the Juniper Update Mechanism . . . . . . . . . 310
Downloading Schemas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Downloading Schemas Using the NSM UI . . . . . . . . . . . . . . . . . . . . . . . . 312
Downloading Schemas Using the GUI Server CLI . . . . . . . . . . . . . . . . . . 312
Applying a Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Part 3
Managing
Chapter 8
Configuring Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
About Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Using Objects Across Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Replacing Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Working with Unused Shared Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Searching for Unused Shared Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Deleting an Unused Shared Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Working with Object Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Searching For and Deleting Duplicate Objects . . . . . . . . . . . . . . . . . . . . . . . 322
Configuring Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Viewing Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Creating Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Adding a Host Address Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Adding a Network Address Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Editing and Deleting Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Replacing Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Adding an Address Object Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Adding a Multicast Group Address Object . . . . . . . . . . . . . . . . . . . . . . . 326
Adding Static DNS Host Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Blocked Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Configuring Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Viewing Predefined Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Creating Custom Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Editing and Deleting Application Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Configuring Schedule Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Creating Schedule Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Configuring Access Profile Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Configuring Quality of Service Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Creating a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Deleting a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Editing a Quality of Service Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Working with DI Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Viewing Predefined DI Attack Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Viewing Attack Version Information for Attack Objects . . . . . . . . . . . . . . . . 333
Viewing Predefined DI Attack Object Groups . . . . . . . . . . . . . . . . . . . . . . . . 334
Updating Predefined DI Attack Objects and Groups . . . . . . . . . . . . . . . . . . . 334
Creating DI Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
xvii
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...