Configuring Custom Policy Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Defining Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Instantiating New Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Adding Custom Detail Object to Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Open Log Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Configuring GTP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Configuring Info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Limiting GTP Message Length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Limiting GTP Message Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Limiting GTP Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Removing Inactive GTP Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Validating Sequence Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Filtering GTP-in-GTP Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Removing GTP R6 Informational Elements . . . . . . . . . . . . . . . . . . . . . . 378
Inspecting Tunnel Endpoint IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Configuring Traffic Logging and Counting . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Traffic Counting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Traffic Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Configuring IMSI Prefix and APN Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Creating an APN Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Creating an IMSI Prefix Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Configuring GTP Message Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Configuring Subscriber Tracing (Lawful Interception) . . . . . . . . . . . . . . . . . . 381
Example: Creating a GTP Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Configuring Service Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Viewing Predefined Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Creating Custom Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Service Object Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Example: Creating a Custom Service and Group . . . . . . . . . . . . . . . . . . 386
Example: Creating a Custom Sun-RPC Service . . . . . . . . . . . . . . . . . . . 387
Example: Creating a Custom MS-RPC Service . . . . . . . . . . . . . . . . . . . 388
Editing and Deleting Service Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Replacing Service Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Configuring SCTP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Configuring an SCTP Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Configuring Authentication Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Configuring General Authentication Server Settings . . . . . . . . . . . . . . . . . . . 391
Configuring Authentication Server Redundancy . . . . . . . . . . . . . . . . . . . . . . 391
Configuring Authentication for User Types . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Domain Name Checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Domain Name Stripping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Configuring Authentication Server Types . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Configuring a RADIUS Authentication Server . . . . . . . . . . . . . . . . . . . . . 393
Configuring a SecurID Authentication Server . . . . . . . . . . . . . . . . . . . . . 396
Configuring an LDAP Authentication Server . . . . . . . . . . . . . . . . . . . . . 398
Configuring a TACACS Authentication Server . . . . . . . . . . . . . . . . . . . . 398
Configuring User Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Configuring Local Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Configuring Local User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
xix
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...