Miscellaneous UTM Features
The UT Manager provides miscellaneous features that support the main activities of
threat management. These include:
•
Multipurpose Internet Mail Extension (MIME) Lists on page 371
•
Extension Lists on page 371
•
Command Lists on page 372
•
URL Patterns on page 372
•
URL Categories on page 372
Multipurpose Internet Mail Extension (MIME) Lists
MIME lists contain the type of MIMEs that can be permitted or denied; for example, text
or html. You can define the extensions that are to be permitted or denied by creating
profiles. The maximum number of characters allowed in a MIME name are 29, in a MIME
entry 40, and a MIME list 1023. The maximum of user defined MIME lists is system
dependent. To create a MIME list:
1.
Select
Object Manager
>
UTM
>
Misc
>
Mime List.
NSM displays two tables: Predefined
UTM Mime List Profiles on top and Custom UTM Mime List Profiles below. You can
only view but not edit the listed predefined profiles. You can create and edit custom
profiles.
2.
Select
+
in the
Custom UTM Mime List Profiles
table. The New Mime List Profile window
opens.
3.
Enter a name for the profile.
4.
Enter a comment or description.
5.
Select a color from the drop-down list.
6.
Enter the multipurpose internet mail extensions for the profile.
7.
Select
OK.
Extension Lists
In an extension file list profile, you can specify various file extensions to be allowed or
blocked; for example, .txt, .pdf, .exe. You can use these list profiles to create antivirus
settings as well. The maximum number of characters allowed in an Extension name are
29, in an Extension entry 15, and an Extension list 255. The maximum number of user
defined Extension lists is system dependent. To create a new Extension list profile:
1.
Select
Object Manager
>
UTM
>
Misc
>
Extension List.
NSM displays two tables:
Predefined UTM Extension List Profiles on top and Custom UTM Extension List Profiles
below. You can only view but not edit the listed predefined profiles. You can create
and edit custom profiles.
2.
Select
+
in the Custom UTM Extension List Profiles table. The
New Extension List
Profile
window opens.
3.
Enter a name for the profile.
371
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...