•
Schedule objects represent time periods and determine when a rule is in effect.
•
Service objects represent predefined and custom network services, such as HTTP/80.
•
Quality of Service profiles (IP Precedence and DSCP profiles) determine the quality
of service for an incoming packet in the network.
•
Shared Stream Control Transmission Protocol (SCTP) objects support protocols
such as IUA, SUA, M2UA, M3UA, and so on, and can be applied to policies.
•
Border Signaling Gateway (BSG) objects allow you to specify the egress-service-point
in a transaction term’s route action. You can specify the device, the gateway in the
device, and a service point for every BSG service point object.
•
BSG Admission Controllers control SIP dialogs and transactions. They are defined
per gateway and referenced from transaction policies.
•
Application layer protection:
•
DI Profiles define the attack signature patterns, protocol anomalies, and the action
you want a security device to take against matching traffic.
•
AV Profiles define the server that contains your virus definitions and antivirus software.
•
Web Filtering Profiles define the URLs, the Web categories, and the action you want
a security device to take against matching traffic.
•
Users and authentication:
•
User objects represent RAS users on your network.
•
Authentication Servers represent the servers in your network used to authenticate
NSM administrators, RAS users, and network traffic.
•
Group Expressions define logical expressions used to include or exclude RAS users.
•
Certificates:
•
Certificate Authority objects represent the certificate authority’s certificate.
•
CRL objects represent the certificate authority’s certificate revocation list.
•
VoIP protection:
•
GTP objects represent client GTP configurations.
•
Extranet policies and custom policy fields:
•
Extranet Policy objects define rules and actions that you may apply to certain traffic
on an extranet device (third-party router).
•
Custom Policy Field objects represent metadata information that you can store and
use in a structured manner.
Use VPN Manager to view and configure the following objects:
323
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...