GTP objects.....................................................................80
HA for guiSvrClusterMgr.............................................80
historical reports............................................................80
ICAP objects....................................................................80
IDP.......................................................................................80
IDP cluster monitor.......................................................80
IDP migration....................................................................81
IDP Profiler operations..................................................81
IDP rulebase......................................................................81
import device....................................................................81
Infranet Controller operations...................................81
inventory.............................................................................81
investigative log reports...............................................81
IP pools...............................................................................81
job status logs, permission to purge........................81
jobs.......................................................................................81
large binary objects........................................................81
license.................................................................................81
logged in admins.............................................................81
multicast rulebases.......................................................82
NAT objects and subtree.............................................82
network honeypot rulebase.......................................82
NSRP Monitor..................................................................82
permitted objects..........................................................82
phase1/phase2 proposal.............................................82
policy custom field data objects..............................82
policy custom field metadata objects...................82
policy lookup table........................................................82
polymorphic objects.....................................................83
polymorphic service objects......................................83
post domain policies....................................................83
pre domain policies.......................................................83
Profiler................................................................................83
Profiler data.....................................................................83
remote settings...............................................................83
rulebases...........................................................................83
run online retention command.................................83
schedule objects............................................................84
schema..............................................................................84
schema details...............................................................84
security explorer.............................................................83
security policies..............................................................84
servers................................................................................84
service objects................................................................84
shared historical log report........................................84
subdomains and groups.............................................84
supplemental CLIs in devices and
templates.....................................................................85
SYNProtector rulebase................................................85
system status monitor, view......................................85
system URL categories................................................85
template operations.....................................................85
traffic signature rulebase............................................85
troubleshoot devices....................................................85
unblock IP.........................................................................85
URL filtering.....................................................................85
user objects.....................................................................86
VLAN objects..................................................................86
VPN Monitor....................................................................86
VPNs...................................................................................86
VSYS profile objects.....................................................86
zone objects....................................................................86
administrators
creating..............................................................................67
permissions......................................................................75
alarm status
setting polling intervals............................................654
viewing............................................................................654
alarms, configuring in firewall rules................................451
alerts, configuring in firewall rules..................................451
antivirus live update settings............................................275
APE rulebase
about................................................................................476
APE rules
adding.....................................................................476, 477
configuring......................................................................476
configuring actions.....................................................480
configuring attack severity......................................483
configuring IP actions.................................................481
configuring Match columns.....................................478
configuring notification.............................................482
configuring services....................................................479
configuring source and destination......................478
API.................................................................................................10
APN filter
about................................................................................379
network ID, setting......................................................380
selection mode, setting............................................380
application
object...............................................................................328
application objects..............................................................328
Application Profiler view......................................................711
application relocation, configuring in firewall
rules.......................................................................................453
ASN1-DN...................................................................................571
atomic configuration
about.................................................................................241
atomic updating...........................................................242, 741
Copyright © 2010, Juniper Networks, Inc.
948
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...