Help Center User GuideGetting StartedFAQRelease Notes
 
X
User Guide
Getting Started
FAQ
Release Notes
Contents  

List of Tables

Table 1: Notice Icons

Table 2: Text and Syntax Conventions

Table 3: Tabs and Their Functionality

Table 4: Navigational Elements

Table 5: Widgets

Table 6: Policy Enforcer Widgets

Table 7: Information Source for the Widgets

Table 8: Events and Logs Summary View Widgets

Table 9: Events and Logs Detail Columns

Table 10: Filter Rules

Table 11: Create Alert Wizard Settings

Table 12: Report Settings

Table 13: Widgets in Summary View

Table 14: Columns in Detail View

Table 15: Widgets in Summary View

Table 16: Columns in Detail View

Table 17: Widgets in Summary View

Table 18: Columns in Detail View

Table 19: Widgets in Summary View

Table 20: Columns in Detail View

Table 21: Columns in Detail View

Table 22: Widgets in Summary View

Table 23: Columns in Detail View

Table 24: IPS Events Summary View Widgets

Table 25: IPS Events Detail Columns

Table 26: Screen Events Summary View Widgets

Table 27: Screen Events Detail View Columns

Table 28: Sky ATP Events Summary View Widgets

Table 29: Sky ATP Events Detail View Columns

Table 30: Apptrack Events Summary View Widgets

Table 31: Apptrack Events Detail View Columns

Table 32: Threat Level Definitions

Table 33: Command & Control Server Data Fields

Table 34: Command & Control Server Contacted Host Data

Table 35: HTTP Scanning Data Fields

Table 36: General Summary Fields

Table 37: Blocked Email Summary View

Table 38: Blocked Email Detail View

Table 39: Email Attachments Scanning Data Fields

Table 40: General Summary Fields

Table 41: Blocked Email Summary View

Table 42: Blocked Email Detail View

Table 43: Fields on the Device Feed Status Page

Table 44: Fields on All Hosts Status Page

Table 45: Fields on the DDoS Feeds Status Page

Table 46: Application Visibility Chart View Columns

Table 47: Application Visibility Grid View Widgets

Table 48: Detail View of Applications

Table 49: Chart View Filters

Table 50: Grid View Widgets

Table 51: Detailed View of the User

Table 52: Source IP Visibility—Filters in Chart View

Table 53: Source IP Visibility—Widgets in Grid View

Table 54: Source IP Visibility—Detailed View

Table 55: Types of Threats

Table 56: Generated Alerts

Table 57: Alert Definitions Settings

Table 58: Alert Definitions Settings

Table 59: Alert Definition Main Page Field

Table 60: Generated Alarms

Table 61: Device Alarms Main Page Fields

Table 62: Dashboard Widgets on the Overview Page

Table 63: Fields on the Monitored Tunnels Page

Table 64: Fields on the Devices Page

Table 65: Job Management Page Actions

Table 66: Archive/Purge Jobs Settings

Table 67: Job Details Fields

Table 68: Reschedule Job Settings

Table 69: Retry Job Settings

Table 70: Job Management Main Page Fields

Table 71: Audit Logs Page Actions

Table 72: Archive/Purge Audit Logs Settings

Table 73: Export Audit Logs Settings

Table 74: Audit Logs Main Page Fields

Table 75: Fields on the Packets Captured Page

Table 76: Purge Policy Setting

Table 77: Fields on the Security Groups Page

Table 78: Fields on the View Members Page

Table 79: Fields on the Virtual Machines Page

Table 80: Fields on the View Networks Details Page

Table 81: Fields on the Security Groups Page

Table 82: Security Devices Page Actions

Table 83: Add Bulk Logical System

Table 84: Security Profile

Table 85: Upload Keys Settings

Table 86: Modify Configuration

Table 87: Basic Setup

Table 88: Add NTP Server Settings

Table 89: Add User Settings

Table 90: Static Routes Actions

Table 91: Create Static Route Settings

Table 92: Create Next Hop Settings

Table 93: Create Qualified Next Hop Settings

Table 94: Routing Instances Actions

Table 95: Create Routing Instance Settings

Table 96: Physical Interfaces Actions

Table 97: Edit Physical Interface Settings

Table 98: Create Logical Interface Settings

Table 99: Add – Address (IPv4) Settings

Table 100: Add – Address (IPv6) Settings

Table 101: Syslog Settings

Table 102: Create Host Configuration Settings

Table 103: Create File Configuration Settings

Table 104: Create User Configuration Settings

Table 105: Create Contents Settings

Table 106: Security Logging Settings

Table 107: Create Stream Configuration Settings

Table 108: Create Exclude Configuration Settings

Table 109: Screens for SRX Series Devices

Table 110: Screens for MX Series Routers

Table 111: Zones Settings

Table 112: Sensor Configuration Details

Table 113: Fields on the Aruba Clear Pass Page

Table 114: Fields on the APBR Tunables Page

Table 115: Express Path Actions

Table 116: Fields on the Add FPC Details Page

Table 117: View Active Configuration Page Actions

Table 118: Modify Custom Settings

Table 119: Reboot Devices Settings

Table 120: Resolve Key Conflict Settings

Table 121: Juniper Web Device Manager Settings

Table 122: SSH to Device Settings

Table 123: Physical Inventory Tab Fields

Table 124: Physical Interfaces Tab Fields

Table 125: Logical Interfaces Tab Fields

Table 126: Acknowledge Device Fingerprint Settings

Table 127: Security Devices Main Page Fields

Table 128: Discovery Profile Settings

Table 129: View Discovery Profile Page Fields

Table 130: Device Discovery Main Page Fields

Table 131: Create Site Page Fields

Table 132: Secure Fabric Page Fields

Table 133: Fields on the Add Enforcement Points Page

Table 134: System Software Specifications for vSRX in VMware NSX Environment

Table 135: Juniper SDSN for VMware NSX ADS Licensing Packages

Table 136: Fields on the NSX Managers Page

Table 137: Fields on the Add NSX Manager Page

Table 138: Fields on the Register Security Service Page

Table 139: Field on the Service Definitions Page

Table 140: Fields on the vCenter Servers Page

Table 141: Firewall Policy Settings

Table 142: Firewall Policy Rules Setting

Table 143: Promoting a device policy to a group policy

Table 144: Firewall Policies Main Page Fields

Table 145: Firewall Policy Rules Main Page Fields

Table 146: Fields on the Unified Policies Page

Table 147: Unified Firewall Policy Settings

Table 148: Firewall Unified Policy Rules Setting

Table 149: Create SSL Proxy

Table 150: Devices with Firewall Policies Main Page Fields

Table 151: Schedules Settings

Table 152: Schedules Main Page Fields

Table 153: Firewall Policy Profile Settings

Table 154: Firewall Policy Profiles Main Page Fields

Table 155: Firewall Policy Template Settings

Table 156: Firewall Policy Templates Main Page Fields

Table 157: Example of Custom-Defined Environment Variables

Table 158: Example of Rule Actions Based on Variable Values

Table 159: Example of Environment Condition

Table 160: Fields on the Environment Page

Table 161: Fields on the Create New Environment Variable Page

Table 162: Fields on the Create New Environment Condition Page

Table 163: Firewall Rule with a Condition

Table 164: Application Firewall Policies Settings

Table 165: Add Rule Settings

Table 166: Application Firewall Policies Main Page Fields

Table 167: Fields on the Create Application Signature Page

Table 168: Supported Context-Direction Combination

Table 169: Application Signature Group Settings

Table 170: Application Signatures Main Page Fields

Table 171: Fields on the Redirect Profile Page

Table 172: Add Redirect Profile

Table 173: Supported Ciphers in Proxy Mode

Table 174: SSL Proxy Logs

Table 175: SSL Proxy Log Prefixes

Table 176: Supported ECDHE Cipher Suits

Table 177: SSL Forward Proxy Profile Settings

Table 178: SSL Forward Proxy Profile Main Page Fields

Table 179: Fields on the Create SSL Reverse Proxy Profile Page

Table 180: Fields on the Active Directory Profile Page

Table 181: Fields on the Create Active Directory Profile Page

Table 182: Update Active Directory Profile Page Fields

Table 183: Access Profile Main Page Fields

Table 184: LDAP Server Configuration Parameters

Table 185: Update Access Profile Page Fields

Table 186: Fields on the Identity Management Profile Page

Table 187: Fields on the Create Identity Management Profile Page

Table 188: Fields on the Update Identity Management Profile page

Table 189: Fields on the End User Profile Page

Table 190: Fields on the Create End User Profile Page

Table 191: IPS Policy Settings

Table 192: IPS Policy Rule Settings

Table 193: IPS Policy Templates Rule Settings

Table 194: IPS Policies Main Page Fields

Table 195: Devices with IPS Policies Main Page Fields

Table 196: IPS Signatures Settings

Table 197: IPS Signature Static Group Settings

Table 198: IPS Signature Dynamic Group Settings

Table 199: IPS Policy Signatures Main Page Fields

Table 200: IPS Policy Template Settings

Table 201: IPS Policy Templates Main Page Fields

Table 202: Persistent NAT Support

Table 203: Translated Address Pool Selection for Source NAT

Table 204: Translated Address Pool Selection for Destination NAT And Static NAT

Table 205: NAT Policy Settings

Table 206: NAT Policy Rules Main Page Field

Table 207: NAT Rules Settings

Table 208: NAT Policies Main Page Fields

Table 209: Devices Main Page Fields

Table 210: NAT Pool Settings

Table 211: NAP Pools Main Page Fields

Table 212: Port Set Settings

Table 213: Port Sets Main Page Fields

Table 214: UTM Policy Settings

Table 215: UTM Policy Main Page Fields

Table 216: Web Filtering Profile Settings

Table 217: Web Filtering Solutions

Table 218: Web Filtering Profile Main Page Fields

Table 219: Fields on the Category Update Page

Table 220: Antivirus Profile Settings

Table 221: Antivirus Main Page Fields

Table 222: Antispam Profile Settings

Table 223: Antispam Profile Main Page Fields

Table 224: Content Filtering Profile Settings

Table 225: Content Filtering Profile Main Page Fields

Table 226: Device Profile Settings

Table 227: Device Profiles Main Page Fields

Table 228: URL Pattern Settings

Table 229: URL Category Lists Settings

Table 230: Fields on the Application Routing Policies Page

Table 231: Fields on the Add APBR Policy Page

Table 232: Fields on the Rules Page

Table 233: Fields on the Rule Page

Table 234: Widgets on the App Based Routing Page

Table 235: Widgets for the Selected Device

Table 236: Fields on the Threat Prevention Policy Page

Table 237: C&C Server Profile Management

Table 238: Infected Host Profile Management

Table 239: Malware Threat Profile Management

Table 240: DDoS Threat Profile Management

Table 241: Threat Prevention Policy Fields

Table 242: Fields on the Feed Sources Page

Table 243: File Category Contents

Table 244: Configure Quarantine Malicious Messages

Table 245: Configure Deliver with Warning Headers

Table 246: Permit

Table 247: Configure Block Malicious Messages

Table 248: Fields on the Add Sky ATP Realm Page

Table 249: Fields on the Modify Sky ATP Realm page

Table 250: File Category Contents

Table 251: Fields on the Modify Whitelist Page

Table 252: Fields on the Modify Blacklist Page

Table 253: Fields on the Create Custom Feed Page, Feeds with Local Files

Table 254: Fields on the Create Custom Feed Page, Feeds with Remote File Server

Table 255: Fields on the Settings Page

Table 256: IPsec VPN Configuration Parameters

Table 257: Endpoint Configuration Parameters

Table 258: VPN Tunnel and Route Setting Parameters

Table 259: Endpoint Settings Parameters

Table 260: Differences between Policy-Based and Route-Based VPNs

Table 261: Settings Guidelines

Table 262: IPsec VPN Main Page Fields

Table 263: Extranet Device Settings

Table 264: Extranet Devices Main Page Fields

Table 265: VPN Profiles Settings – Phase 1 IKE Negotiation Configuration

Table 266: VPN Profiles Settings – Phase 2 IKE Negotiation Configuration

Table 267: VPN Profiles Main Page Fields

Table 268: Fields on the Geo IP Policy Page

Table 269: Fields on the Policy Enforcement Group Page

Table 270: Fields on the Create Addresses Page

Table 271: Address Group Settings

Table 272: Addresses Main Page Fields

Table 273: Service Settings

Table 274: Create Protocol Type Settings

Table 275: Service Group Settings

Table 276: Variable Profile Settings

Table 277: Create Variable Address Profile Setting

Table 278: Create Zone Profile Settings

Table 279: Zone Set Settings

Table 280: Zone Sets Main Page Fields

Table 281: Fields on the Metadata Page

Table 282: Fields on the Create Metadata Page

Table 283: Predefined Roles in the Change Control Workflow

Table 284: Fields on the Change Control Workflow Setting Page

Table 285: Fields on the Create Change Request Page

Table 286: Fields on the Changes Submitted Page

Table 287: Fields on the Changes Not Submitted Page

Table 288: Detailed View of Changes

Table 289: Fields on the Change Request History Page

Table 290: Sky ATP Components

Table 291: List of features by Sky ATP Configuration Type

Table 292: List of available UI pages by Sky ATP Configuration Type

Table 293: Comparing the Juniper Connected Security Configuration Steps to the non-Juniper Connected Security Configuration Steps

Table 294: Overview of Steps to Install and Configure Policy Enforcer

Table 295: virt-install Options

Table 296: Policy Enforcer Ports to Communicate with Security Director

Table 297: Policy Enforcer Ports to Communicate with SRX Series Devices

Table 298: Policy Enforcer Ports to Communicate with cloudfeeds.sky.junipersecurity.net

Table 299: Policy Enforcer Services

Table 300: NSX Ports

Table 301: Connectors Information- Main Page

Table 302: Fields on the Create Connector Page for AWS and Contrail

Table 303: Fields on the Create Connector Page

Table 304: Fields on the Detailed View Page

Table 305: Recommended Action to Be Performed on the Infected Hosts

Table 306: Fields on the Add Sky ATP Realm Page

Table 307: SKY ATP and Spotlight support Quick Summary

Table 308: Log Report Definition Settings

Table 309: Policy Analysis Report Definition Settings

Table 310: Bandwidth Report Definition Settings

Table 311: Report Definitions Columns

Table 312: Run Now Settings

Table 313: Report Definition Main Page Fields

Table 314: Predefined Report Definitions

Table 315: My Profile Settings

Table 316: Change Password Settings

Table 317: User Settings

Table 318: Active Sessions Fields

Table 319: Users Details Page Fields

Table 320: Users Main Page Fields

Table 321: Role Settings

Table 322: Roles Details Page Fields

Table 323: Roles Main Page Fields

Table 324: Domain Settings

Table 325: Assigned Users Tab Fields

Table 326: Assigned Devices Tab Fields

Table 327: Assigned Remote Profiles Tab Fields

Table 328: Domains Main Page Fields

Table 329: Remote Profile Settings

Table 330: Remote Profiles Details Page Fields

Table 331: Remote Profiles Main Page Fields

Table 332: Logging Node Settings

Table 333: Log Forwarding

Table 334: Logging Management Main Page Fields

Table 335: Node Statistics

Table 336: Logging Devices Main Page Fields

Table 337: Device Configuration Main Page Fields

Table 338: Fields on the Monitor Settings Page

Table 339: Signature Database Main Page Fields

Table 340: Fields on the Policy Sync Settings Page

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit