Figure 32: Connecting Vsys Devices Across Domains . . . . . . . . . . . . . . . . . . . . . . 147
Figure 33: Adding a Secure Access Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Figure 34: Adding a J Series Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Figure 35: Adding the First Member to a J Series Cluster . . . . . . . . . . . . . . . . . . . . 161
Figure 36: Adding the Second Member to a J Series Cluster . . . . . . . . . . . . . . . . . 162
Figure 37: Cluster Member Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Figure 38: Configuring Cluster Members for Paris Vsys Cluster . . . . . . . . . . . . . . 165
Figure 39: Paris Cluster Members and Paris Vsys Cluster Members . . . . . . . . . . . 166
Chapter 5
Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Figure 40: Device Info and Configuration Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Figure 41: ScreenOS and IDP Device Configuration Information . . . . . . . . . . . . . 190
Figure 42: ScreenOS Device Object Configuration Data . . . . . . . . . . . . . . . . . . . . 192
Figure 43: Secure Access Device Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Figure 44: Example of Setting Values in a Template . . . . . . . . . . . . . . . . . . . . . . . 199
Figure 45: Applying a Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Figure 46: Template Override Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Figure 47: Revert to a Template or Default Value . . . . . . . . . . . . . . . . . . . . . . . . . 201
Figure 48: View Denial of Service Defense Values from DoS Template . . . . . . . 204
Figure 49: Configure DoS Defense Settings for the DoS2 Template . . . . . . . . . . 205
Figure 50: View Template Priority (DoS Highest) . . . . . . . . . . . . . . . . . . . . . . . . . 206
Figure 51: View Values from DoS and DoS2 Templates . . . . . . . . . . . . . . . . . . . . 206
Figure 52: View DoS2 Value for Source IP Based Session Limit . . . . . . . . . . . . . . 207
Figure 53: View DoS Value for SYN-ACK-ACK Proxy Protection Setting . . . . . . . 207
Figure 54: View Default SYN-ACK-ACK Proxy Protection Setting . . . . . . . . . . . . 207
Figure 55: Up and Down Arrows for Changing the Sequence of a List . . . . . . . . 209
Figure 56: Identifying Ordered List Entries that Do Not Match the Template
Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Figure 57: Template Operations Directive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Figure 58: Select Template Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Figure 59: Template Operations Job Information Dialog Box . . . . . . . . . . . . . . . . 219
Figure 60: Adding a Configuration Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Figure 61: Applying a Configuration Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Figure 62: Configuration Group Applied . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Figure 63: Excluding a Configuration Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Figure 64: Configuring Routing Engine Specific Parameters . . . . . . . . . . . . . . . . 235
Figure 65: Viewing the Routing Engine Configuration . . . . . . . . . . . . . . . . . . . . . . 236
Chapter 6
Updating Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Figure 66: Delta Configuration Summary Example . . . . . . . . . . . . . . . . . . . . . . . . 251
Figure 67: Job Manager Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Figure 68: Job Information Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Figure 69: Failed Update Job Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
Chapter 7
Managing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Figure 70: Viewing the Device Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Figure 71: Comparing the Device Inventory with the NSM Database . . . . . . . . . . 270
Figure 72: Adding a Shared Binary Data Object . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Figure 73: Linking to a Shared Binary Data Object . . . . . . . . . . . . . . . . . . . . . . . . 274
Figure 74: Attack Update Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Copyright © 2010, Juniper Networks, Inc.
xxxviii
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...