•
Unified Access Control (Infranet Controller) devices—The policy management server
of the Juniper Networks LAN access control solution.
•
SSL VPN (Secure Access) devices.
•
Virtual Chassis—Stacked EX Series devices functioning as one logical EX Series switch
or an SRX cluster represented in NSM as a virtual chassis.
•
Vsys devices—Virtual devices that exist within a physical security device. For details
on adding vsys devices, see “Adding Vsys Devices” on page 146.
•
Clusters—A cluster is a set of multiple devices joined together in a high availability
configuration to ensure continued network uptime. You can build ScreenOS clusters
(NSRP), IDP clusters, Junos clusters from J Series or SRX Series devices, Secure Access
clusters, or Infranet Controller clusters. For details on adding clusters, see “Adding
Clusters” on page 151.
•
Vsys clusters—A vsys cluster device is a vsys device that has a cluster as its root device.
For details on adding vsys clusters and vsys devices, see “Adding a Vsys Cluster and
Vsys Cluster Members” on page 164.
•
Extranet devices—An extranet device is a third-party device or a device not managed
by NSM. For details on adding extranet devices, see “Adding an Extranet Device” on
page 150.
Before adding any device type, you must determine the device status. After adding the
device, you must verify the device configuration.
Determine Device Status
How you add your devices to the management system depends on the network status
of the device. You can import deployed devices, or you can model devices that have not
yet been deployed:
•
Import deployed devices—Deployed devices are the devices you are currently using in
your existing network. These devices have already been configured with a static or
dynamic IP address and other basic information. For deployed devices, you can import
the existing device configuration information into NSM.
NOTE:
To import device configurations, the connection between NSM and the managed
device must be at least 28.8 Kbps. For details on installing NSM on your network, refer
to the Network and Security Manager Installation Guide.
•
Model undeployed devices—Undeployed devices are devices that you are not currently
using in your network, and typically do not have IP addresses, zones, or other basic
network information. For undeployed devices, you can model a new device configuration,
and later install that configuration on the device.
The Add Device wizard walks you through each step of the device creation process. It
prompts you to choose a workflow.
Device is reachable
is the default option. The wizard
then prompts you for specific device information, such as the device platform name, OS
name and version, IP address, and device administrator name, and then uses that
99
Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Adding Devices
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...