Importing the Cluster configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Example: Creating, Activating, and Updating a Cluster with Modeled Cluster
Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Adding the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Modeling the Cluster Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Activating the Cluster Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Updating the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Adding a Vsys Cluster and Vsys Cluster Members . . . . . . . . . . . . . . . . . . . . . 164
Example: Adding a Vsys Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Adding Multiple Devices Using Automatic Discovery (Junos, SA, and IC Devices
) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Adding a Device Discovery Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Running a Device Discovery Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Adding Many Devices Using CSV Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Creating the CSV File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Devices with Static IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Device with Dynamic IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Undeployed Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Validating the CSV File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Importing Many Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Adding and Importing Many Devices with Static IP Addresses . . . . . . . 176
Adding and Importing Many Devices with Dynamic IP Addresses . . . . . 176
Modeling Many Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Using Rapid Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Modeling and Activating Many Devices with Configlets . . . . . . . . . . . . . 178
Activating Many Devices with Configlets . . . . . . . . . . . . . . . . . . . . . . . . . 179
Adding Device Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Example: Creating a Device Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Setting Up NSM to Work With Infranet Controller and Infranet Enforcer . . . . . . . 181
Avoiding Naming Conflicts of the Authorization Server Object . . . . . . . . . . . 181
Avoiding NACN Password Conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Chapter 5
Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
About Device Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
About Configuring Device Families . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
About Configuring Clusters, VPNs, Vsys Devices, Policies, and Shared
Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Configuration Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
About the Device Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
About Device Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
About Configuration Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Editing Devices Using the Device Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Validation and Data Origination Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Configuring Device Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Configuring ScreenOS/IDP Device Features . . . . . . . . . . . . . . . . . . . . . . 192
Configuring Secure Access or Infranet Controller Device Features . . . . 194
Configuring Junos Device Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Updating the Configuration on the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Copyright © 2010, Juniper Networks, Inc.
xii
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...