Help Center User GuideGetting StartedFAQRelease Notes
 
X
User Guide
Getting Started
FAQ
Release Notes
Contents  

List of Tables

Table 1: Notice Icons

Table 2: Text and Syntax Conventions

Table 3: Tabs and Their Functionality

Table 4: Navigational Elements

Table 5: Widgets

Table 6: Policy Enforcer Widgets

Table 7: Information Source for the Widgets

Table 8: Events and Logs Summary View Widgets

Table 9: Events and Logs Detail Columns

Table 10: Filter Rules

Table 11: Create Alert Wizard Settings

Table 12: Report Settings

Table 13: Widgets in Summary View

Table 14: Columns in Detail View

Table 15: Widgets in Summary View

Table 16: Columns in Detail View

Table 17: Widgets in Summary View

Table 18: Columns in Detail View

Table 19: Widgets in Summary View

Table 20: Columns in Detail View

Table 21: Columns in Detail View

Table 22: Widgets in Summary View

Table 23: Columns in Detail View

Table 24: IPS Events Summary View Widgets

Table 25: IPS Events Detail Columns

Table 26: Screen Events Summary View Widgets

Table 27: Screen Events Detail View Columns

Table 28: Sky ATP Events Summary View Widgets

Table 29: Sky ATP Events Detail View Columns

Table 30: Apptrack Events Summary View Widgets

Table 31: Apptrack Events Detail View Columns

Table 32: Threat Level Definitions

Table 33: Command & Control Server Data Fields

Table 34: Command & Control Server Contacted Host Data

Table 35: HTTP Scanning Data Fields

Table 36: General Summary Fields

Table 37: Blocked Email Summary View

Table 38: Blocked Email Detail View

Table 39: Email Attachments Scanning Data Fields

Table 40: General Summary Fields

Table 41: Blocked Email Summary View

Table 42: Blocked Email Detail View

Table 43: Fields on the Device Feed Status Page

Table 44: Fields on All Hosts Status Page

Table 45: Fields on the DDoS Feeds Status Page

Table 46: Application Visibility Chart View Columns

Table 47: Application Visibility Grid View Widgets

Table 48: Detail View of Applications

Table 49: Chart View Filters

Table 50: Grid View Widgets

Table 51: Detailed View of the User

Table 52: Source IP Visibility—Filters in Chart View

Table 53: Source IP Visibility—Widgets in Grid View

Table 54: Source IP Visibility—Detailed View

Table 55: Types of Threats

Table 56: Generated Alerts

Table 57: Alert Definitions Settings

Table 58: Alert Definitions Settings

Table 59: Alert Definition Main Page Field

Table 60: Generated Alarms

Table 61: Device Alarms Main Page Fields

Table 62: Dashboard Widgets on the Overview Page

Table 63: Fields on the Monitored Tunnels Page

Table 64: Fields on the Devices Page

Table 65: Job Management Page Actions

Table 66: Archive/Purge Jobs Settings

Table 67: Job Details Fields

Table 68: Reschedule Job Settings

Table 69: Retry Job Settings

Table 70: Job Management Main Page Fields

Table 71: Audit Logs Page Actions

Table 72: Archive/Purge Audit Logs Settings

Table 73: Export Audit Logs Settings

Table 74: Audit Logs Main Page Fields

Table 75: Fields on the Packets Captured Page

Table 76: Purge Policy Setting

Table 77: Fields on the Security Groups Page

Table 78: Fields on the View Members Page

Table 79: Fields on the Virtual Machines Page

Table 80: Fields on the View Networks Details Page

Table 81: Fields on the Security Groups Page

Table 82: Security Devices Page Actions

Table 83: Add Bulk Logical System

Table 84: Security Profile

Table 85: Upload Keys Settings

Table 86: Modify Configuration

Table 87: Basic Setup

Table 88: Add NTP Server Settings

Table 89: Add User Settings

Table 90: Static Routes Actions

Table 91: Create Static Route Settings

Table 92: Create Next Hop Settings

Table 93: Create Qualified Next Hop Settings

Table 94: Routing Instances Actions

Table 95: Create Routing Instance Settings

Table 96: Physical Interfaces Actions

Table 97: Edit Physical Interface Settings

Table 98: Create Logical Interface Settings

Table 99: Add – Address (IPv4) Settings

Table 100: Add – Address (IPv6) Settings

Table 101: Syslog Settings

Table 102: Create Host Configuration Settings

Table 103: Create File Configuration Settings

Table 104: Create User Configuration Settings

Table 105: Create Contents Settings

Table 106: Security Logging Settings

Table 107: Create Stream Configuration Settings

Table 108: Create Exclude Configuration Settings

Table 109: Screens for SRX Series Devices

Table 110: Screens for MX Series Routers

Table 111: Zones Settings

Table 112: Sensor Configuration Details

Table 113: Fields on the Aruba Clear Pass Page

Table 114: Fields on the APBR Tunables Page

Table 115: Express Path Actions

Table 116: Fields on the Add FPC Details Page

Table 117: View Active Configuration Page Actions

Table 118: Modify Custom Settings

Table 119: Reboot Devices Settings

Table 120: Resolve Key Conflict Settings

Table 121: Juniper Web Device Manager Settings

Table 122: SSH to Device Settings

Table 123: Physical Inventory Tab Fields

Table 124: Physical Interfaces Tab Fields

Table 125: Logical Interfaces Tab Fields

Table 126: Acknowledge Device Fingerprint Settings

Table 127: Security Devices Main Page Fields

Table 128: Discovery Profile Settings

Table 129: View Discovery Profile Page Fields

Table 130: Device Discovery Main Page Fields

Table 131: Create Site Page Fields

Table 132: Secure Fabric Page Fields

Table 133: Fields on the Add Enforcement Points Page

Table 134: System Software Specifications for vSRX in VMware NSX Environment

Table 135: Fields on the NSX Managers Page

Table 136: Fields on the Add NSX Manager Page

Table 137: Fields on the Register Security Service Page

Table 138: Field on the Service Definitions Page

Table 139: Fields on the vCenter Servers Page

Table 140: Firewall Policy Settings

Table 141: Firewall Policy Rules Setting

Table 142: Promoting a device policy to a group policy

Table 143: Firewall Policies Main Page Fields

Table 144: Firewall Policy Rules Main Page Fields

Table 145: Fields on the Unified Policies Page

Table 146: Unified Firewall Policy Settings

Table 147: Firewall Unified Policy Rules Setting

Table 148: Create SSL Proxy

Table 149: Create IDP Default

Table 150: Devices with Firewall Policies Main Page Fields

Table 151: Schedules Settings

Table 152: Schedules Main Page Fields

Table 153: Firewall Policy Profile Settings

Table 154: Firewall Policy Profiles Main Page Fields

Table 155: Firewall Policy Template Settings

Table 156: Firewall Policy Templates Main Page Fields

Table 157: Example of Custom-Defined Environment Variables

Table 158: Example of Rule Actions Based on Variable Values

Table 159: Example of Environment Condition

Table 160: Fields on the Environment Page

Table 161: Fields on the Create New Environment Variable Page

Table 162: Fields on the Create New Environment Condition Page

Table 163: Firewall Rule with a Condition

Table 164: Application Firewall Policies Settings

Table 165: Add Rule Settings

Table 166: Application Firewall Policies Main Page Fields

Table 167: Fields on the Create Application Signature Page

Table 168: Supported Context-Direction Combination

Table 169: Application Signature Group Settings

Table 170: Application Signatures Main Page Fields

Table 171: Fields on the Redirect Profile Page

Table 172: Add Redirect Profile

Table 173: Supported Ciphers in Proxy Mode

Table 174: SSL Proxy Logs

Table 175: SSL Proxy Log Prefixes

Table 176: Supported ECDHE Cipher Suits

Table 177: SSL Forward Proxy Profile Settings

Table 178: SSL Forward Proxy Profile Main Page Fields

Table 179: Fields on the Create SSL Reverse Proxy Profile Page

Table 180: Fields on the Active Directory Profile Page

Table 181: Fields on the Create Active Directory Profile Page

Table 182: Update Active Directory Profile Page Fields

Table 183: Access Profile Main Page Fields

Table 184: LDAP Server Configuration Parameters

Table 185: Update Access Profile Page Fields

Table 186: Fields on the Identity Management Profile Page

Table 187: Fields on the Create Identity Management Profile Page

Table 188: Fields on the Update Identity Management Profile page

Table 189: Fields on the End User Profile Page

Table 190: Fields on the Create End User Profile Page

Table 191: IPS Policy Settings

Table 192: IPS Policy Rule Settings

Table 193: IPS Policy Templates Rule Settings

Table 194: IPS Policies Main Page Fields

Table 195: Devices with IPS Policies Main Page Fields

Table 196: IPS Signatures Settings

Table 197: IPS Signature Static Group Settings

Table 198: IPS Signature Dynamic Group Settings

Table 199: IPS Policy Signatures Main Page Fields

Table 200: IPS Policy Template Settings

Table 201: IPS Policy Templates Main Page Fields

Table 202: Persistent NAT Support

Table 203: Translated Address Pool Selection for Source NAT

Table 204: Translated Address Pool Selection for Destination NAT And Static NAT

Table 205: NAT Policy Settings

Table 206: NAT Policy Rules Main Page Field

Table 207: NAT Rules Settings

Table 208: NAT Policies Main Page Fields

Table 209: Devices Main Page Fields

Table 210: NAT Pool Settings

Table 211: NAP Pools Main Page Fields

Table 212: Port Set Settings

Table 213: Port Sets Main Page Fields

Table 214: UTM Policy Settings

Table 215: UTM Policy Main Page Fields

Table 216: Web Filtering Profile Settings

Table 217: Web Filtering Solutions

Table 218: Web Filtering Profile Main Page Fields

Table 219: Fields on the Category Update Page

Table 220: Antivirus Profile Settings

Table 221: Antivirus Main Page Fields

Table 222: Antispam Profile Settings

Table 223: Antispam Profile Main Page Fields

Table 224: Content Filtering Profile Settings

Table 225: Content Filtering Profile Main Page Fields

Table 226: Device Profile Settings

Table 227: Device Profiles Main Page Fields

Table 228: Fields on the Default Configuration Page

Table 229: Default UTM Configuration Settings

Table 230: URL Pattern Settings

Table 231: URL Category Lists Settings

Table 232: Fields on the Application Routing Policies Page

Table 233: Fields on the Add APBR Policy Page

Table 234: Fields on the Rules Page

Table 235: Fields on the Rule Page

Table 236: Widgets on the App Based Routing Page

Table 237: Widgets for the Selected Device

Table 238: Fields on the Threat Prevention Policy Page

Table 239: C&C Server Profile Management

Table 240: Infected Host Profile Management

Table 241: Malware Threat Profile Management

Table 242: DDoS Threat Profile Management

Table 243: Threat Prevention Policy Fields

Table 244: Fields on the Feed Sources Page

Table 245: File Category Contents

Table 246: Configure Quarantine Malicious Messages

Table 247: Configure Deliver with Warning Headers

Table 248: Permit

Table 249: Configure Block Malicious Messages

Table 250: Fields on the Add Sky ATP Realm Page

Table 251: Fields on the Modify Sky ATP Realm page

Table 252: File Category Contents

Table 253: Fields on the Modify Whitelist Page

Table 254: Fields on the Modify Blacklist Page

Table 255: Fields on the Add JATP Server Page

Table 256: Fields on the Create Custom Feed Page, Feeds with Local Files

Table 257: Fields on the Create Custom Feed Page, Feeds with Remote File Server

Table 258: Fields on the Settings Page

Table 259: IPsec VPN Configuration Parameters

Table 260: Endpoint Configuration Parameters

Table 261: VPN Tunnel and Route Setting Parameters

Table 262: Endpoint Settings Parameters

Table 263: Differences between Policy-Based and Route-Based VPNs

Table 264: Settings Guidelines

Table 265: IPsec VPN Main Page Fields

Table 266: Extranet Device Settings

Table 267: Extranet Devices Main Page Fields

Table 268: VPN Profiles Settings – Phase 1 IKE Negotiation Configuration

Table 269: VPN Profiles Settings – Phase 2 IKE Negotiation Configuration

Table 270: VPN Profiles Main Page Fields

Table 271: Fields on the Geo IP Policy Page

Table 272: Fields on the Policy Enforcement Group Page

Table 273: Fields on the Create Addresses Page

Table 274: Address Group Settings

Table 275: Addresses Main Page Fields

Table 276: Service Settings

Table 277: Create Protocol Type Settings

Table 278: Service Group Settings

Table 279: Variable Profile Settings

Table 280: Create Variable Address Profile Setting

Table 281: Create Zone Profile Settings

Table 282: Zone Set Settings

Table 283: Zone Sets Main Page Fields

Table 284: Fields on the Metadata Page

Table 285: Fields on the Create Metadata Page

Table 286: Predefined Roles in the Change Control Workflow

Table 287: Fields on the Change Control Workflow Setting Page

Table 288: Fields on the Create Change Request Page

Table 289: Fields on the Changes Submitted Page

Table 290: Fields on the Changes Not Submitted Page

Table 291: Detailed View of Changes

Table 292: Fields on the Change Request History Page

Table 293: Sky ATP Components

Table 294: List of features by Sky ATP Configuration Type

Table 295: List of available UI pages by Sky ATP Configuration Type

Table 296: Comparing the Juniper Connected Security Configuration Steps to the non-Juniper Connected Security Configuration Steps

Table 297: Overview of Steps to Install and Configure Policy Enforcer

Table 298: virt-install Options

Table 299: Policy Enforcer Ports to Communicate with Security Director

Table 300: Policy Enforcer Ports to Communicate with SRX Series Devices

Table 301: Policy Enforcer Ports to Communicate with cloudfeeds.sky.junipersecurity.net

Table 302: Policy Enforcer Services

Table 303: NSX Ports

Table 304: Connectors Information- Main Page

Table 305: Fields on the Create Connector Page for AWS and Contrail

Table 306: Fields on the Create Connector Page

Table 307: Fields on the Detailed View Page

Table 308: Recommended Action to Be Performed on the Infected Hosts

Table 309: Fields on the Add Sky ATP Realm Page

Table 310: SKY ATP and Spotlight support Quick Summary

Table 311: Log Report Definition Settings

Table 312: Policy Analysis Report Definition Settings

Table 313: Bandwidth Report Definition Settings

Table 314: Report Definitions Columns

Table 315: Run Now Settings

Table 316: Report Definition Main Page Fields

Table 317: Predefined Report Definitions

Table 318: My Profile Settings

Table 319: Change Password Settings

Table 320: User Settings

Table 321: Active Sessions Fields

Table 322: Users Details Page Fields

Table 323: Users Main Page Fields

Table 324: Role Settings

Table 325: Roles Details Page Fields

Table 326: Roles Main Page Fields

Table 327: Domain Settings

Table 328: Assigned Users Tab Fields

Table 329: Assigned Devices Tab Fields

Table 330: Assigned Remote Profiles Tab Fields

Table 331: Domains Main Page Fields

Table 332: Remote Profile Settings

Table 333: Remote Profiles Details Page Fields

Table 334: Remote Profiles Main Page Fields

Table 335: Logging Node Settings

Table 336: Log Forwarding

Table 337: Logging Management Main Page Fields

Table 338: Node Statistics

Table 339: Logging Devices Main Page Fields

Table 340: Device Configuration Main Page Fields

Table 341: Fields on the Monitor Settings Page

Table 342: Signature Database Main Page Fields

Table 343: Fields on the Policy Sync Settings Page

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit