Chapter 6
Updating Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Table 27: Additional Configuration States for Devices Running ScreenOS 5.1 and
Later . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Table 28: Delta Configuration Summary Information . . . . . . . . . . . . . . . . . . . . . 250
Table 29: Device States During Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Chapter 7
Managing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Table 30: Scheduled Security Update (SSU) Command Line Parameters . . . . . 293
Part 3
Managing
Chapter 8
Configuring Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Table 31: Application Table Tab Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Table 32: Deep Inspection Profile Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Table 33: Deep Inspection IP Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Table 34: IP Protocol Name and Type Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . 344
Table 35: Supported Services for Service Bindings . . . . . . . . . . . . . . . . . . . . . . . . 345
Table 36: Attack Pattern Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
Table 37: Attack Pattern Syntax Example Matches . . . . . . . . . . . . . . . . . . . . . . . 348
Table 38: DI Attack Header Match Modifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Table 39: Service Table Tab Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Table 40: Group Expression Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Table 41: Source NAT Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Table 42: Destination NAT Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . 415
Chapter 9
Configuring Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Table 43: IDP Rule Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Table 44: Severity Levels, Recommended Actions and Notifications . . . . . . . . . 470
Table 45: APE Rule Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Table 46: Actions for Backdoor Rule: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Table 47: Rule Shadowing Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Table 48: Polymorphic Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
Part 4
Monitoring
Chapter 17
Realtime Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
Table 49: Device Status Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Table 50: Device Polling Intervals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 654
Table 51: Device Detail Status Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Table 52: Device Statistics Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656
Table 53: Device-Specific Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
Table 54: Policy Distribution Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 659
Table 55: Protocol Distribution Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
Table 56: VPN Monitor Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 662
Table 57: Active VPN Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663
Table 58: Ethernet Statistics View Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
Table 59: Flow Statistics View Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Table 60: Attack Counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667
Table 61: Resource Statistics Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
Table 62: Administrators View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 671
Copyright © 2010, Juniper Networks, Inc.
xlii
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...