•
Rulebases—When you initially create a security policy, only the Firewall rulebase and
possibly the IDP rulebase appear by default. To create a rule in other rulebases, you
must manually add those rulebases to the policy.
The following sections detail these options.
Configuring Objects for Rules
Objects are reusable logical entities that represent specific settings, configurations, or
external pieces of hardware. You can reuse objects in multiple areas in the NSM GUI.
Within rules, you use objects to define the source, destination, and service, as well as to
specify settings for rule options, such as Web Filtering or attack protection.
For some object types, such as services and IDP attack objects, NSM contains a database
of predefined objects. If the predefined objects do not meet your networking requirements,
you can create custom objects and add them to the object database. For other object
types, such as address objects, DI profiles, and Global MIPS, no predefined objects exist;
before you can use one of these objects in a rule, you must create the object in Object
Manager.
Applying the Same Object to Multiple Rules
You can apply the same object (column value) to a selection of policy rules. Rule groups
must be in an expanded state to apply the same object to the rules of a rule group.
Columns that disallow duplicate values, such as the rule ID and No. columns cannot be
used to apply the same object to a selection of rules.
NOTE:
You cannot apply the same object to a selection of rules for Predefined policies,
VPN rules, or Central rules on a Regional Server regular policy.
To apply the same object to a selection of policy rules:
1.
Select all the rules to which the column value will be applied:
•
To select all the rules in a rulebase, click on any rule in the rulebase and press
Ctrl
+
a
.
•
To select a contiguous range of rules in a rulebase, press
Shift
+
Ctrl
and select
the rules.
•
To select a noncontiguous range of rules in a rulebase, press
Ctrl
and select the
rules.
2.
Right-click on the column value of the rule that you want to apply to the selected
rules and select
Apply value to selected rules
from the menu.
The selected column value is applied to all selected rules.
NOTE:
After you select the rules, a right-click on any column value displays the menu
“Apply Value to selected rules,” and no other menu options are available for the selected
column value.
439
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...