To see the exact rules that are applied to a specific device, in Device Manager, right-click
a device and select
Policy > View Pending Device Policy
.
NOTE:
If a device specified in the Install column does not support a specific
rule option configured for the rule, you can still install the security policy on
the device, but the rule option is not enabled for that device. Additionally,
during policy validation, a warning appears for each unsupported rule option.
For details, see “Validating Security Policies” on page 509.
Configuring Firewall Rule Options
Rule options enable you to configure additional protection mechanisms and other
miscellaneous features. You can configure the following rule options:
•
Enabling NAT on page 454
•
Enabling GTP for Firewall Rules on page 455
•
Configuring Traffic Shaping in a Security Policy on page 455
•
Enabling Logging and Counting for Firewall Rules on page 457
•
Miscellaneous on page 458
•
ID on page 459
•
Configuring Web Filtering for Firewall Rules on page 460
•
Configuring Authentication for Firewall Rules on page 461
•
Configuring Antivirus for Firewall Rules on page 462
•
Configuring a DI Profile/Enable IDP for Firewall Rules on page 463
•
Configuring the Session Close Notification Rule on page 465
To quickly configure all rule options, right-click the
Rule Options
column and select
Configure All Options
. The Configure Options dialog box appears; select the option tab
you want to configure for the rule.
Enabling NAT
You can configure a policy-based network address translation (NAT) for a firewall rule.
NAT enables the security device to translate the IP address of incoming or outgoing traffic
so that the packets are routeable on the network.
Edit Source NAT
You can configure the security device to translate the source IP address:
•
To translate the source IP address using a predefined range of IP addresses, select
NAT
and choose a Dynamic IP pool (DIP) object. For each matching packet, the device
translates the original source address into a IP address selected from the DIP pool.
•
To translate the source IP address using the IP address of the outgoing interface on
the security device, select
Use Interface
.
Copyright © 2010, Juniper Networks, Inc.
454
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...