setting a domain filter................................................770
setting a flag filter.......................................................769
setting a port number range filter...........................771
setting a port range filter............................................771
setting a protocol filter..............................................769
setting a range filter....................................................770
setting a time-based filter........................................770
setting an address filter............................................769
setting an alert filter...................................................769
find utility.................................................................................768
firewall options......................................................................745
Firewall rule options...........................................................465
firewall rulebase
about...............................................................................440
permissions.....................................................................80
rule groups.....................................................................442
firewall rules
about...............................................................................440
configuring.....................................................................448
configuring actions.....................................................452
configuring address objects....................................450
configuring alerts.........................................................457
configuring antivirus...................................................462
configuring application relocation........................459
configuring authentication.......................................461
configuring counting and alarms...........................457
configuring devices.....................................................453
configuring DI profile..................................................463
configuring GTP object.............................................455
configuring HA session backup.............................459
configuring logging and counting..........................457
configuring NAT...........................................................454
configuring preferred ID............................................459
configuring rule options............................................454
configuring rule title...................................................465
configuring scan manager.......................................462
configuring schedule..................................................458
configuring services....................................................452
configuring traffic shaping.......................................455
configuring Web filtering profile............................460
configuring zones........................................................449
deleting.............................................................................517
deny action....................................................................453
disabling...........................................................................517
negating source or destination..............................450
permit action.................................................................453
reject action...................................................................453
reject action changed to deny..................................511
rule groups.......................................................................517
using MIPs as source or destination....................450
VPN links.........................................................................441
VPN rules.........................................................................441
Firewall/VPN reports............................................................811
firmware, adjusting version on device..........................269
first data packet context for custom attack
object....................................................................................354
first packet context for custom attack object...........354
flag.............................................................................................802
flag filters
setting..............................................................................769
flow properties, viewing.....................................................355
flow statistics.........................................................................750
device-specific view, described............................668
viewing.............................................................................676
FQDN........................................................................................580
from object icon.....................................................................193
FW/VPN reports............................................................810, 811
G
group expressions
about................................................................................410
configuring in firewall rules......................................462
group IKE ID............................................................................565
group, device...........................................................................182
GTP
about.................................................................................381
APN filter........................................................................384
configuring in firewall rules......................................455
filtering GTP-in-GTP packets.................................383
IMSI prefix filter............................................................385
limiting GTP message length...................................381
limiting GTP tunnels...................................................382
limiting GTP-C message rate..................................382
message filtering.........................................................386
removing inactive GTP tunnels..............................382
subscriber tracing (lawful interception)............386
traffic counting.............................................................383
traffic logging................................................................383
validating sequence numbers................................382
GUI Server
about.....................................................................................11
configuring for log exporting...................................796
permissions......................................................................85
processes...........................................................................12
guiSvrCLI.sh utility................................................................819
Copyright © 2010, Juniper Networks, Inc.
964
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...