•
Groups—Group your devices by platform, OS version, location, or function, and then
add them to your security policies.
•
Zone Exceptions—To simplify your rules, define a common To Zone and From Zone
for all devices in the rule, and then specify zone exceptions to change the To and From
zones for specific devices. Zone exceptions add flexibility to your rules, enabling you
to manage more devices in a single rule.
•
Filtering—Filter on From and To Zones to see rules between zones.
•
Scheduling—Schedule a period during which a security policy is in effect on the devices
in a rule. Create schedule objects as one-time, recurring, or both.
•
Security and Protection—Configure a rule to look for attacks, viruses, or specific URLs.
•
Traffic Shaping—Use your firewall rules to control the amount of traffic permitted
through your managed devices.
Error Prevention, Recovery, and Auditing
Using NSM’s error prevention and recovery features, you can ensure that you are
consistently sending stable configurations to your devices, and that your device remains
connected to NSM. You can track each change made by a NSM administrator to help
you identify when, how, and what changes were made to your managed devices.
Device Configuration Validation
NSM alerts you to configuration errors while you work in the UI. Each field that has incorrect
or incomplete data displays an error icon:
Move your cursor over the icon to see details. For more details on validation, see
“Validation Icons in the User Interface” on page 31.
Policy Validation
The policy validation tool checks your security policies and alerts you to possible problems
before you install them on your managed devices.
Atomic Configuration and Updating
If the configuration deployment fails for any reason, the device automatically uses the
last installed stable configuration. If the configuration deployment succeeds, but the
device loses its connection to the management system, the device restores the last
installed configuration. This feature minimizes downtime and ensures that NSM always
maintains a stable connection to the managed device.
Your security devices can be updated atomically, which enables the device to receive
the entire modeled configuration (all commands) before executing those commands,
instead of executing commands as they are received from the management system.
Because the device no longer needs to maintain a constant connection to the
management system during updating, you can configure changes to management
connection from the NSM UI.
7
Copyright © 2010, Juniper Networks, Inc.
Chapter 1: Introduction to Network and Security Manager
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...