1.
In the main navigation tree, select
Policy Manager > Central Manager Policies
.
2.
Select either
Central Manager Pre Rules
or
Central Manager Post Rules
.
3.
Right-click the rule you want to modify and select
Copy, Paste, or Cut
. If you select
Paste, you have additional options to paste the rule before or after another rule.
A modified pre/post rule replaces the existing pre/post rule on the regional server.
Associated shared objects, if they are new, are replicated in the regional server.
Delete prerules and postrules
This procedure assumes that a Central Manager administrator is logged onto a Central
Manager client, and a pre/post rule has been pushed to a regional server.
To delete a pre/post rule:
1.
In the main navigation tree, select
Policy Manager > Central Manager Policies
.
2.
Select either
Central Manager Pre Rules
or
Central Manager Post Rules
.
3.
Right-click the rule you want to modify and select
Delete
.
Associated shared objects (if they are not polymorphic objects), in the regional server,
are also deleted from the regional server.
Polymorphic Objects
The Policy Manager uses shared objects (such as address, zone, and attack) when defining
various components of a policy rule. Polymorphic objects are objects that can be defined
at the Central Manager or regional server level. Polymorphic objects can be used as place
holders for values that will be defined in a different context (in a regional server domain
or subdomain, for instance).
Prerules and postrules are defined at the Central Manager level or regional server level
and can use shared objects that are defined by regional administrators. To provide regional
server administrators the capability of customizing Central Manager prerules and
postrules, shared objects defined in Central Manager are flexible and can be customized
by regional administrators, creating polymorphic objects.
Customizing Polymorphic Objects
Each polymorphic object contains a mapping table. Each entry of the mapping table has
an attribute of domain, device, and a concrete shared object reference of the same type.
You can customize a shared object by adding, deleting, or modifying an entry in the
mapping table.
The regional server administrator can customize polymorphic objects by adding local,
concrete shared objects to it. The mapping table shows only the current domain’s entries.
Therefore, if an administrator is in the global domain, no subdomain entries are visible.
This section contains the following topics:
•
Access Control of Polymorphic Object on page 531
Copyright © 2010, Juniper Networks, Inc.
530
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...