NOTE:
When you cut and paste a rule, your preferred ID is retained. However,
when you copy and paste a rule, a new ID is created.
To cut and paste a rule, right-click inside the No. column (the first column) of the rule
and select
Edit > Cut
. Next, select a rule that is above or below the position you want to
paste the cut rule into, then select
Edit > Paste >
<above> <below>
.
Using Cut, Copy, and Paste on Rule Fields
You can cut, copy, and paste a column field in a rule to other column fields that have the
same context. When you cut or copy a field, you can perform multiple paste operations.
Cut, copy, and paste operations are available for all column fields except rule ID column
fields. The cut operation is not available for generic column fields such as Notification
and Action.
To perform cut, copy, and paste operations on rule fields:
1.
From the policy rule you want to cut or copy from, right-click in the field and select
Edit > Cut
or
Edit > Copy
. When an element in the field is cut, it is replaced by either
“any” or “default”, depending on the field.
2.
From the policy rule field you want to update, right-click in the field and select
Edit >
Paste
.
The field value you cut or copied is added in the field that received the paste operation.
If an element is pasted into a field that specifies “any,” then “any” is deleted.
Cut, copy, and paste operations are not supported for the following policies:
•
VPN policy rules
•
Central rules on a regional server regular policy.
The following limitations apply to cut, copy and paste operations:
•
Cut operations on fields of predefined policies are disallowed because predefined
policies cannot be edited; however, copy operations are supported.
•
There is no undo operation for cut, copy, or paste.
•
You can copy but cannot cut fields that specify “any” or “default.”
•
Cut, copy, and paste operations are supported on negate source or destination
addresses, but only the address is cut or copied, not the negation. When pasting into
a field, the existing negate attribute in the field takes precedence.
Dragging and Dropping Objects
Use the pull-down menu in the “Shared Objects For Policy” pane to easily select and add
shared objects, including address, service, Global MIP, Global VIP, attack, device, VLAN,
and custom field objects, to your security policies. Select the object and drag it into the
appropriate policy column. When you drag objects beyond the visible rows or columns,
Copyright © 2010, Juniper Networks, Inc.
516
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...