excluding.........................................................................228
list entries.......................................................................226
ordered list entries, adding with............................229
overriding values in.....................................................228
reverting to values in..................................................228
sharing across multiple devices.............................230
templates, using with................................................230
validating........................................................................226
wildcards, using with..................................................226
configuration logs report.....................................................811
configuration states............................................................249
configuration summary, running...........................253, 256
Configure panel........................................................................27
configuring
ACVPN.............................................................................625
destination NAT object..............................................419
Junos NAT policy.........................................................539
Junos OS NAT object...................................................417
legacy NAT object........................................................415
logging....................................................................739, 743
monitoring...........................................................659, 709
NAT objects....................................................................414
reporting.........................................................................809
source NAT object........................................................417
TACACS Authentication Server.............................404
VPNs..................................................................................551
configuring in rule.................................................................465
configuring objects................................................................321
connection states.................................................................249
connections, BGP peer......................................................306
counting, configuring in firewall rules...........................457
CRLs (certificate revocation list)...................................424
custom applications............................................................333
custom Citrix client.............................................................284
custom log views..................................................................759
custom reports
creating.............................................................................817
deleting............................................................................818
organizing........................................................................818
custom sign-in pages..........................................................278
customer support..................................................................xlix
contacting JTAC............................................................xlix
CVE references......................................................................346
D
Dashboard
using.................................................................................709
Data Model
defined............................................................................308
importing..........................................................................311
updating.........................................................................309
data model, defined...........................................................839
data origination icons..........................................................192
data point count, configuring.................................782, 823
data types................................................................................781
Deep Inspection
activating subscription on device.........................289
attack objects, custom..............................................343
checking attack object database..........................293
local attack object update......................................290
profiles in firewall rules.............................................463
profiles, about...............................................................337
updating attack object database.........................289
default values in templates...............................................210
delta configuration summary................................253, 256
deny action, configuring in firewall rules.....................453
dependant activities..............................................................75
destination NAT object.......................................................419
destination NAT policy.......................................................543
destination NAT, configuring in firewall rules............455
device certificates, permissions........................................78
device configuration
about................................................................................188
importing...........................................................................112
link from Log Viewer...................................................776
memory optimization..................................................191
modeling.........................................................................130
permissions..............................................................79, 80
promoting to template..............................................202
unsupported in UI.........................................................195
updating..........................................................................256
device connection
modifying........................................................................195
to NSM..............................................................................195
device delta config, permission to view.........................79
Device Edit dialog
EX Series devices...........................................................191
IDP devices......................................................................192
Infranet Controller devices........................................191
J Series devices...............................................................191
ScreenOS devices........................................................192
Secure Access devices................................................191
Device Editor
about................................................................................189
961
Copyright © 2010, Juniper Networks, Inc.
Index
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...