This information will be exported using the Policy Export tool, if the user selects Expanded
Mode when exporting data.
Policy filtering is supported on individual values in the Custom Details column.
Defining Metadata
The metadata is defined using the Policy Details node located in the navigation tree.
Users can see all metadata definitions as well as add, edit, or delete definitions. Existing
metadata is displayed in table format and supported at the domain level. Definitions in
the global domain are accessible in subdomains for creating objects that comply with
the global domain.
Deleting a metadata definition forces all objects to comply with the definition and lists
all usages of those objects. When deleting a metadata definition, all the objects complying
that metadata are also deleted. In addition, it removes all usages of the changed objects
from the security policy rules that referred to them.
Instantiating New Objects
As with metadata definitions, you can also create custom policy objection on the domain
level. Objects you create in the global domain will be available for all subdomains, while
objects created in the subdomains will only be available within the subdomain in which
it was created.
When you delete an object, NSM displays all the usages of that object in the security
policy rules, and will ask you for confirmation of the command. Once you confirm that
you want to delete the object, NSM will remove all usages of the object you are deleting
from the security policy rules that refer to the deleted object.
Adding Custom Detail Object to Rules
You can add custom detail objects to a rule in the policy using the same mechanism as
other shared objects, such as service or address objects. You can use multiple selections
for objects using the Shared data type. This allows you to add multiple objects complying
with the same metadata. For example, you can add multiple e-mail addresses or phone
number for each rule.
Once you have added custom objects to the rules, NSM displays the custom object along
with the metadata name. For example, after adding an address to a rule, the value
displayed in the rule could look like the following:
Email Address:
Requisition Number:
JN0001
NSM will sort the entries in the Custom Details cell by the metadata name appended to
the custom object value. NSM will be copy and paste data in the Custom Details column
along with other rule data when a rule is copied and pasted.
Objects with a String data type will provide a special edit dialog that allow you to change
the string value contained within. The dialog allowing for this information is accessible
by right-clicking on the selected value in the Context Menu. Objects with a Shared data
Copyright © 2010, Juniper Networks, Inc.
380
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...