NOTE:
After you select the rules, a right-click on any column value displays
the menu “Apply Value to selected rules,” and no other menu options are
available for the selected column value.
Naming of Address Objects in a Security Policy That References Devices Running
ScreenOS or Junos OS
Device updates might fail when a policy that references address objects for ScreenOS
devices is assigned to a J Series device or an SRX Series device because the address
object naming conventions in Junos OS are more restrictive than the naming conventions
in ScreenOS . For devices running Junos OS, the address object name must be a string
that begins with a letter and consists of letters, numbers, dashes, and underscores. For
devices running ScreenOS, the address object name can include numbers, characters,
and symbols. To ensure that a device running Junos OS can use the address objects
referenced by the security policy that is assigned to the device, all address objects in that
policy must follow the address object naming conventions for Junos OS. If the policy that
is assigned to a device running Junos OS contains preexisting address objects for ScreenOS
devices, these address objects must be renamed to follow the address object naming
conventions for Junos OS.
Using the Policy Filter Tool
NSM provides a Policy Filter tool to filter policy rules-based on one or more filter conditions
specified for rule attributes. One filter can contain several filter conditions for different
attributes. The filter only applies to the current selected rulebase. The filter results are
displayed in the same rulebase. Rules that do not match filter conditions are hidden. In
the firewall rulebase, only open rule groups are filtered. When a filter is set and a closed
rule group is expanded, only rules that match the filter will be displayed in the group. For
information about using the Policy Filter tool, refer to the NSM Online Help.
Filtering the Comment Field
You can use filters for the comments field of your policy. By default, search finds an exact
match unless used with a regular expression.
For example, you have two rules with the following two comments: test1 and
juniper,\ntest1. If you want to find all the rules that have test1 in the comments field, you
must use a regular expression. If you do not use the regular expression checkbox, the
search returns rules with comment test1 only.
If you want to find all rules that end with the string test1, you can use one of the following
regular expressions:
•
.*test1|.*\ntest1
•
(.*|.*\n)test1
Using a Predefined IDP Policy
When you create a new IDP security policy, you can select from the following predefined
policies or use the Policy Creation Wizard, as described in the next section.
Copyright © 2010, Juniper Networks, Inc.
446
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...