•
Pre and Post Rules on page 526
•
Polymorphic Objects on page 530
About Security Policies
A security policy determines how your managed devices handle your network traffic. To
display previously configured security policies, select
Configure > Policy Manager
and
double-click
Policies
. When you edit a security policy, the name of that security policy
appears in bold in the main navigation tree.
Using the Network and Security Manager (NSM) UI, you can configure rules in up to ten
rulebases (Zone, Global, Multicast, IDP, Exempt, APE, Backdoor Detection, SYN Protector,
Traffic Anomalies, and Network Honeypot) for each security policy.
NOTE:
In the ScreenOS WebUI and CLI, a security policy is a single statement
that defines a source, destination, zone, direction, and service. In NSM, those
same statements are known as rules, and a security policy is a collection of
rules.
After you create a security policy by building rules in one or more rulebases, you can assign
that policy to specific devices. For information about assigning a policy to a device, see
“Assigning a Security Policy to a Device” on page 509.
Viewing Rulebase Columns for a Security Policy
By default, each rulebase displays a subset of available columns for each rule. This mode,
known as Compact Mode, contains columns in which you can configure typical rule
parameters. To see all columns for the rulebase, change the mode of the security policy
to Expanded: From the menu bar, select
View > Show Expanded Mode
. You can set a
different mode for each security policy. You can also create Custom Mode views based
on the columns shown in the Compact Mode or Expanded Mode view.
To create a Custom Mode view:
1.
Select the mode from which you want to create a Custom Mode:
•
To create a custom mode based on the Compact Mode column options, select
View > Show Compact Mode
.
•
To create a custom mode based on the Expanded Mode column options, select
View > Show Expanded Mode
.
2.
Move the cursor over a column header of the security policy. A small icon appears to
the left above the No. column. Click on the icon to display the Select Visible Columns
dialog box, as shown in Figure 82 on page 437.
Copyright © 2010, Juniper Networks, Inc.
436
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...