are configured. A validation error is generated for devices running versions below ScreenOS
6.2.
The Global rulebase does not contain source and destination zone columns. Because
global rules permit or deny traffic flow between all zones on a device, both the source
and destination zones are global and are not displayed.
NOTE:
You can also configure “shared zones.” The NSM Policy Manager uses shared
objects, also known as “polymorphic objects,” including zones to define various
components of a policy rule. For more information, see “Central Manager” on page 619.
Configuring Source and Destination Addresses for Firewall Rules
You create firewall rules to enable traffic to flow between two network components. In
the NSM system, address objects are used to represent the components on your network:
hosts, networks, and servers. When you add the address object to the rule, you are
assigning it to a security zone on your security device.
You can add predefined address objects for the network components that originate and
receive the traffic, or configure them as you create a firewall rule to control traffic between
those components:
•
To configure an address object as you are configuring the Source and Destination
components of a rule, right-click in the Source or Destination column of a rule and
select
Add Address
. Next, click the Add icon at the top of the New Source Addresses
or New Destination Addresses dialog box and configure the desired address object.
•
You can add an entire address group or select an individual address object from within
the group.
TIP:
When a Policy Manager tree table view includes an address group or service group,
you can view the object (leaf member) count for the group by hovering over the group
with the mouse. This feature is also supported for polymorphic objects in the address
or service object category.
You can also negate all address objects in the source or destination columns of a rule.
When the source or destination is negated, NSM considers all address objects defined
for the current domain except the negated objects as part of the source or destination
for that rule. To negate the source or destination, you must have previously added one
or more address objects to the source or destination column of a rule.
You can add global MIP and VIP objects as the source or destination address in a rule;
however:
•
When installing the rule on devices running ScreenOS 5.0 and later, you can add multiple
MIPs.
•
When installing the rule on devices running ScreenOS 5.3 and later, you can add multiple
MIPs and VIPs.
Copyright © 2010, Juniper Networks, Inc.
444
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...