E
error handling..............................................................................4
F
firewall policy type
action..................................................................................35
anti-spam.........................................................................39
application........................................................................38
application-services.....................................................39
attack-policy....................................................................38
auths....................................................................................37
av..........................................................................................39
count...................................................................................36
grp........................................................................................39
ha_session_backup........................................................37
idp........................................................................................38
log........................................................................................36
log-actions.......................................................................36
name_.................................................................................35
nat........................................................................................36
nat-dip...............................................................................36
no-idle-reset.....................................................................37
pol_name..........................................................................35
preferred-id......................................................................36
schedule.............................................................................37
service_collection...........................................................35
target_collection............................................................36
traffic...................................................................................37
url-blk.................................................................................36
url-protocol......................................................................36
I
IDP
attacks exempted..........................................................32
detects interactive traffic............................................25
rulebase................................................................25, 30, 51
rules.....................................................................................39
IDP Sensor.................................................................................50
See also
IDP
idppolicy_type
action..................................................................................42
attacks................................................................................42
comments.........................................................................41
customOptions_collection..........................................41
diffserv...............................................................................42
dst_addr_collection........................................................41
dst_addr_negate..............................................................41
dst_zone_collection........................................................41
enabled...............................................................................41
ipaction..............................................................................42
log........................................................................................42
log-actions........................................................................42
preferred-id.......................................................................41
rb-link..................................................................................41
ruleno...................................................................................41
service.................................................................................41
seslog..................................................................................42
severity...............................................................................42
src_addr_collection........................................................41
src_addr_negate..............................................................41
src_zone_collection........................................................41
target_collection.............................................................43
terminal..............................................................................41
vlan......................................................................................42
Intrusion Detection and Prevention (IDP)
supported on devices
See
IDP
J
Job Service API
GetConfigSummaryRequest......................................12
GetDeltaConfigRequest...............................................13
GetJobResultRequest....................................................13
GetJobStatusRequest...................................................13
GetRunningConfigRequest..........................................12
ImportDeviceRequest....................................................12
UpdateDeviceRequest...................................................11
using for job management.....................................11, 111
L
log
action settings..................................................................51
alert.....................................................................................42
attack..................................................................................47
audit....................................................................................20
data and packet data....................................................14
event....................................................................................14
GTP.....................................................................................50
packet.................................................................................42
packet data retrieval.......................................................4
packets..............................................................................30
record.................................................................................30
Log Service API
GetPacketDataRequest...............................................14
Log Viewer
using to view logs
See
log
Copyright © 2010, Juniper Networks, Inc.
150
Network and Security Manager 2010.4 API Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 10: ...Copyright 2010 Juniper Networks Inc x Network and Security Manager 2010 4 API Guide...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Network and Security Manager 2010 4 API Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager 2010 4 API Guide...
Страница 24: ...Copyright 2010 Juniper Networks Inc 6 Network and Security Manager 2010 4 API Guide...
Страница 34: ...Copyright 2010 Juniper Networks Inc 16 Network and Security Manager 2010 4 API Guide...
Страница 58: ...Figure 10 IDP Rulebase Copyright 2010 Juniper Networks Inc 40 Network and Security Manager 2010 4 API Guide...
Страница 92: ...Copyright 2010 Juniper Networks Inc 74 Network and Security Manager 2010 4 API Guide...
Страница 98: ...Copyright 2010 Juniper Networks Inc 80 Network and Security Manager 2010 4 API Guide...
Страница 100: ...Copyright 2010 Juniper Networks Inc 82 Network and Security Manager 2010 4 API Guide...
Страница 112: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager 2010 4 API Guide...
Страница 128: ...Copyright 2010 Juniper Networks Inc 110 Network and Security Manager 2010 4 API Guide...
Страница 138: ...Copyright 2010 Juniper Networks Inc 120 Network and Security Manager 2010 4 API Guide...
Страница 152: ...Copyright 2010 Juniper Networks Inc 134 Network and Security Manager 2010 4 API Guide...
Страница 165: ...PART 6 Index Index on page 149 147 Copyright 2010 Juniper Networks Inc...
Страница 166: ...Copyright 2010 Juniper Networks Inc 148 Network and Security Manager 2010 4 API Guide...