Table 16: Multicast Rulebase Data Elements
(continued)
Description
Data Element
From_zone exceptions.
from_zone_exceptions
Multicast group(s) to which the multicast traffic is sent.
Multicast policy rules define the flow of multicast traffic between the source and
multicast groups. You can use this parameter to specify one particular multicast group,
any multicast group, or an access list that identifies the allowed multicast groups.
src-group
Destination zone. The source will send multicast traffic to this zone.
to_zone
To_zone exceptions.
to_zone_exceptions_collection
Destination group. Optionally, you can map the source multicast group address to
another multicast group address. When the source sends the multicast traffic to a
multicast group address, the security device translates the original multicast group
address to another address that you specified.
dst-group
The rule applies to this type of multicast control traffic.
message_type
Bi-directional policy.
bi-directional
Custom options.
customOptions_collection
Comment about the multicast collection.
comments
Rule group name.
rb-link
Specifies the security devices or templates that will receive and use this rule. You can
select multiple security devices on which to install the rule.
target_collection
SYN Protector (rb_syndef_collection)
The SYN Protector (rb_syndef_collection) rulebase protects your network from
SYN-floods by ensuring that a three-way handshake is performed successfully for
specified TCP traffic. If you know that your network is vulnerable to a SYN-flood, use the
SYN-Protector rulebase to prevent it.
These data elements are illustrated and described in Figure 12 on page 46 and Table 17
on page 46.
45
Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Security Data Model
Содержание NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 10: ...Copyright 2010 Juniper Networks Inc x Network and Security Manager 2010 4 API Guide...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Network and Security Manager 2010 4 API Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager 2010 4 API Guide...
Страница 24: ...Copyright 2010 Juniper Networks Inc 6 Network and Security Manager 2010 4 API Guide...
Страница 34: ...Copyright 2010 Juniper Networks Inc 16 Network and Security Manager 2010 4 API Guide...
Страница 58: ...Figure 10 IDP Rulebase Copyright 2010 Juniper Networks Inc 40 Network and Security Manager 2010 4 API Guide...
Страница 92: ...Copyright 2010 Juniper Networks Inc 74 Network and Security Manager 2010 4 API Guide...
Страница 98: ...Copyright 2010 Juniper Networks Inc 80 Network and Security Manager 2010 4 API Guide...
Страница 100: ...Copyright 2010 Juniper Networks Inc 82 Network and Security Manager 2010 4 API Guide...
Страница 112: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager 2010 4 API Guide...
Страница 128: ...Copyright 2010 Juniper Networks Inc 110 Network and Security Manager 2010 4 API Guide...
Страница 138: ...Copyright 2010 Juniper Networks Inc 120 Network and Security Manager 2010 4 API Guide...
Страница 152: ...Copyright 2010 Juniper Networks Inc 134 Network and Security Manager 2010 4 API Guide...
Страница 165: ...PART 6 Index Index on page 149 147 Copyright 2010 Juniper Networks Inc...
Страница 166: ...Copyright 2010 Juniper Networks Inc 148 Network and Security Manager 2010 4 API Guide...