type will have a special dialog that allows you to edit the value contained within. After
saving the change, it is reflected in all rules using that object.
Open Log Viewer
You can open the Log Viewer from any rule in the policy. NSM will open the Log Viewer
screen to display only those logs that were generated as a result of the selected rule.
This option is available only if the policy has not been edited since the last time it was
pushed to a device. Otherwise, the action is displayed as disabled. You can right-click
the policy to access this option.
Configuring GTP Objects
To enable a security device to manage GTP traffic, you must create a GTP object and
then apply it to a security policy rule. The rule with the GTP object defines how the device
handles GTP packets: If a GTP packet matches the rule, the device attempts to further
match the packet data with the parameters set in the GTP object.
For detailed information on GTP, refer to the Concepts & Examples ScreenOS Reference
Guide, Volume 13: General Packet Radio Service.
Using GTP objects, you can configure multiple rules that enforce different GTP
configurations in the same security policy. For example, you can configure a security
policy that enables a device to control GTP traffic differently based on source and
destination zones and addresses, action, and so on.
You configure GTP objects in the Object Manager. From the main navigation tree, select
Object Manager > GTP Objects
, then click the Add icon to display the New GTP Object
configuration screens. For each object, you can configure the following settings:
•
“Configuring Info” on page 376
•
“Configuring Traffic Logging and Counting” on page 378
•
“Configuring IMSI Prefix and APN Filtering” on page 379
•
“Configuring GTP Message Filtering” on page 381
•
“Configuring Subscriber Tracing (Lawful Interception)” on page 381
The following sections detail each GTP setting. For an example on creating a GTP object,
see “Example: Creating a GTP Object” on page 381.
Configuring Info
The Info settings define the basic properties of the GTP object, and specify how the
security device should handle GTP messages and tunnels.
Limiting GTP Message Length
To limit the length of a GTP message, you can specify the minimum and maximum
number of bytes permitted in a message length field. In the GTP header, the message
length field indicates the length of the GTP payload. It does not include the length of the
GTP header itself, the UDP header, or the IP header.
Copyright © 2010, Juniper Networks, Inc.
376
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...