as ticket number, vendor contact, and so on, for each rule in the rulebase. NSM provides
a shared object to store these custom details while the table contains a column that
corresponds to these custom details.
•
AV objects—Represent the AV servers, software, and profiles available to devices
managed by NSM.
•
ICAP objects—Represents the Internet Content Adaptation Protocol (ICAP) servers
and server groups used in ICAP AV objects.
•
GTP objects—Represent GTP client connections.
•
Authentication Servers—Represent external authentication servers, such as RADIUS
and SecurID servers. You can use an authentication server object to authenticate NSM
administrators (RADIUS only), XAuth users, IKE RAS users, and L2TP users.
•
Certificate Authority objects—Represent the certificate authority’s certificate.
•
CRL objects—Represent the certificate authority’s certificate revocation list.
•
Group Expressions—These logical expressions include OR, AND, and NOT statements
that set conditions for authentication requirements.
•
IP Pools—Represent a range of IP addresses. You use IP pools when you configure a
DHCP Server for your managed devices.
•
NAT objects—Represent MIPs, VIPs, and DIPs.
•
Remote Settings—Represent DNS and WINS servers. You use a remote settings object
when configuring XAuth or L2TP authentication in a VPN.
•
Routing instance objects— A routing instance is a collection of routing tables, interfaces
contained in these routing tables, and routing option configurations. A routing instance
object configured in Object Manager can be included in the RADIUS server and LDAP
server configurations within the access profile object. A routing instance object is a
polymorphic object (similar to zone objects) that maintains the mapping between the
actual routing instance and the device in which it is created.
•
Regional Servers—Represent NSM servers managed by a Central Manager.
•
Zone objects—Represent zones in a Central Manager or Regional Server.
•
Schedule objects—Represent specific dates and times. You can use schedule objects
in firewall rules to specify a time or time period that the rule is in effect.
•
Web filtering objects (Web Profiles)—Define the URLs, the Web categories, and the
action you want a security device to take against matching traffic.
•
Service objects—Represent services running on your network, such as FTP, HTTP, and
Telnet. NSM contains a database of service objects for well-known services; you can
also create new service objects to represent the custom services you run on your
network.
•
User objects—Represent the remote users that access the network protected by the
security device. To provide remote users with access, create a user object for each
user, and then create a VPN that includes those user objects.
•
VLAN objects—Limit rule matching to packets within a particular VLAN.
Copyright © 2010, Juniper Networks, Inc.
30
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...