M
message types
SimpleRequest.................................................................21
SimpleResponse.............................................................21
N
network address translation (NAT).................................36
NSM Security
data model.......................................................................23
rulebases...........................................................................25
NSM server
catches application-level errors.................................4
connecting to.....................................................................4
login........................................................................................7
logout....................................................................................8
nsmpolicy_collection_type
policy_type........................................................................23
See also
policy_type
P
policy_type
accesstype........................................................................23
comment...........................................................................23
createFrom.......................................................................23
name_.................................................................................23
rulebases...........................................................................23
port scan
distributed........................................................................50
TCP......................................................................................50
UDP.....................................................................................50
R
rb_backdoor_type
name_..................................................................................27
rules.....................................................................................27
rules_collection................................................................27
rb_idp_type
name_..................................................................................41
next_preferred_id.............................................................41
rowcountperrule_collection........................................41
rules_collection................................................................41
rule
attach matching.............................................................29
backdoor...........................................................................26
global..................................................................................25
row count per....................................................................41
rule ID.............................................................28, 32, 36, 41
service object...................................................................28
rulebases
backdoor ...........................................................................25
exempt ..............................................................................30
firewall................................................................................33
IDP.......................................................................................39
multicast...........................................................................43
rules.....................................................................................25
SYN protector..................................................................45
S
security policy
rulebases...........................................................................25
SOAP/HTTPS..............................................................................3
subtree filter
attribute matching expressions..................................8
containment nodes.........................................................8
content matching nodes...............................................8
namespace selection......................................................8
selection nodes.................................................................8
support, technical
See
technical support
System Service API................................................................95
GetSystemInfoRequest..................................................8
LoginRequest......................................................................7
LogoutRequest..................................................................8
RespondToChallengeRequest.....................................8
using for authentication.................................................7
using for authorization....................................................7
T
technical support
contacting JTAC.............................................................xvii
third-party developers ............................................................3
traffic
flow......................................................................................25
matching to rules............................................................25
V
vlan
messages in specified..................................................29
tag.........................................................................................51
VLAN tag....................................................................................32
W
Web Service Definition Language.......................................3
WSDL.............................................................................................3
Data Centric API............................................................135
Job Service API...............................................................121
Log Service API..............................................................145
System Service API......................................................129
151
Copyright © 2010, Juniper Networks, Inc.
Index
Содержание NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 10: ...Copyright 2010 Juniper Networks Inc x Network and Security Manager 2010 4 API Guide...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Network and Security Manager 2010 4 API Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager 2010 4 API Guide...
Страница 24: ...Copyright 2010 Juniper Networks Inc 6 Network and Security Manager 2010 4 API Guide...
Страница 34: ...Copyright 2010 Juniper Networks Inc 16 Network and Security Manager 2010 4 API Guide...
Страница 58: ...Figure 10 IDP Rulebase Copyright 2010 Juniper Networks Inc 40 Network and Security Manager 2010 4 API Guide...
Страница 92: ...Copyright 2010 Juniper Networks Inc 74 Network and Security Manager 2010 4 API Guide...
Страница 98: ...Copyright 2010 Juniper Networks Inc 80 Network and Security Manager 2010 4 API Guide...
Страница 100: ...Copyright 2010 Juniper Networks Inc 82 Network and Security Manager 2010 4 API Guide...
Страница 112: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager 2010 4 API Guide...
Страница 128: ...Copyright 2010 Juniper Networks Inc 110 Network and Security Manager 2010 4 API Guide...
Страница 138: ...Copyright 2010 Juniper Networks Inc 120 Network and Security Manager 2010 4 API Guide...
Страница 152: ...Copyright 2010 Juniper Networks Inc 134 Network and Security Manager 2010 4 API Guide...
Страница 165: ...PART 6 Index Index on page 149 147 Copyright 2010 Juniper Networks Inc...
Страница 166: ...Copyright 2010 Juniper Networks Inc 148 Network and Security Manager 2010 4 API Guide...