Table 13: Exempt Rulebase Data Elements
(continued)
Description
Data Element
Rule number.
ruleno
Comments about the exempt collection.
comments
Custom options.
customOptions_collection
Collection enabled.
enabled
A rule ID is a number that uniquely identifies a rule within the rulebase and security policy.
After you install a rule as part of a security policy on a security device, you can view the rule
by logging in locally to the device. However, when you view it through the Web UI or CLI,
the rule appears as an individual policy. The individual policy on the device has the same
ID as the rule in the management system, enabling you to determine which rules are on
specific devices.
preferred-id
Rule group name.
rb-link
The source sends traffic from this zone.
src_zone_collection
Address of the traffic source.
src_addr_collection
Negates the specified source address.
src_addr_negate
The source sends traffic to this zone.
dst_zone_collection
Destination address for the traffic.
dst_addr_collection
Negates the specified destination address.
dst_addr_negate
Exempt type service.
service
The attacks that IDP will exempt for the specified source/destination address. You must
include at least one attach object in an exempt rule.
attacks
This parameter configures a rule that only applies to messages in specified VLANs. The
possible settings are:
•
Any (default) = Any rule will be applied to messages in any VLAN and to messages
without a VLAN tag. This setting has the same effect as not specifying a VLAN. Any can
be sent to devices that do not support VLAN tagging.
•
None = A rule will be applied only to messages that do not have a VLAN tag. Rules with
this value set cannot be sent to devices that do not support VLAN tagging.
•
vlan_list_collection = Specifies the VLAN tags to which the rule applies. You must create
VLAN objects before applying them to the rules. Rules with this value set cannot be sent
to devices that do not support VLAN tagging.
vlan
Specifies the security devices or templates that will receive and use this rule. You can select
multiple security devices on which to install the rule.
target_collection
Copyright © 2010, Juniper Networks, Inc.
32
Network and Security Manager 2010.4 API Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 10: ...Copyright 2010 Juniper Networks Inc x Network and Security Manager 2010 4 API Guide...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Network and Security Manager 2010 4 API Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager 2010 4 API Guide...
Страница 24: ...Copyright 2010 Juniper Networks Inc 6 Network and Security Manager 2010 4 API Guide...
Страница 34: ...Copyright 2010 Juniper Networks Inc 16 Network and Security Manager 2010 4 API Guide...
Страница 58: ...Figure 10 IDP Rulebase Copyright 2010 Juniper Networks Inc 40 Network and Security Manager 2010 4 API Guide...
Страница 92: ...Copyright 2010 Juniper Networks Inc 74 Network and Security Manager 2010 4 API Guide...
Страница 98: ...Copyright 2010 Juniper Networks Inc 80 Network and Security Manager 2010 4 API Guide...
Страница 100: ...Copyright 2010 Juniper Networks Inc 82 Network and Security Manager 2010 4 API Guide...
Страница 112: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager 2010 4 API Guide...
Страница 128: ...Copyright 2010 Juniper Networks Inc 110 Network and Security Manager 2010 4 API Guide...
Страница 138: ...Copyright 2010 Juniper Networks Inc 120 Network and Security Manager 2010 4 API Guide...
Страница 152: ...Copyright 2010 Juniper Networks Inc 134 Network and Security Manager 2010 4 API Guide...
Страница 165: ...PART 6 Index Index on page 149 147 Copyright 2010 Juniper Networks Inc...
Страница 166: ...Copyright 2010 Juniper Networks Inc 148 Network and Security Manager 2010 4 API Guide...