2.
From the policy rule field you want to update, right-click in the field and select
Edit
> Paste
.
The field value you cut or copied is added in the field that received the paste
operation. If an element is pasted into a field that specifies “any,” then “any” is deleted.
Cut, copy, and paste operations are not supported for the following policies:
•
VPN policy rules
•
Central rules on a regional server regular policy.
The following limitations apply to cut, copy and paste operations:
•
Cut operations on fields of predefined policies are disallowed because predefined
policies cannot be edited; however, copy operations are supported.
•
There is no undo operation for cut, copy, or paste.
•
You can copy but cannot cut fields that specify “any” or “default.”
•
Cut, copy, and paste operations are supported on negate source or destination
addresses, but only the address is cut or copied, not the negation. When pasting into
a field, the existing negate attribute in the field takes precedence.
Dragging and Dropping Objects
Use the pull-down menu in the “Shared Objects For Policy” pane to easily select and add
shared objects, including address, service, Global MIP, Global VIP, attack, device, VLAN,
and custom field objects, to your security policies. Select the object and drag it into the
appropriate policy column. When you drag objects beyond the visible rows or columns,
the scroll bar will move horizontally or vertically, if there are more rules or columns
available into which an object can be dropped.
From the main Address Tree and Service Tree, you can drag Address and Service objects
into and out of groups.
Drag and drop support is also available in configuration dialogs for the following:
•
Source and Destination columns of Zone-based and Global Firewall rulebases
•
Source, Destination, and Attacks columns of IDP rulebase
•
Source, Destination, and Application columns of APE rulebase
•
Source, Destination, and Attacks columns of Exempt rulebase
•
Source and Destination columns of Backdoor rulebase
•
Source and Destination columns of Network Honeypot rulebase
•
Source and Destination columns of Traffic Anamolies rulebase
•
Source and Destination columns of SYN Protector rulebase
•
Source and Destination columns of Permitted Object entries
509
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...