Failing Over or Reverting Interfaces
Some security devices support port modes that bind a second backup interface to the
untrust zone. For these port modes, the backup interface is used only when there is a
failure on the connection through the primary interface or when you manually force traffic
from the primary interface to the backup.
To force a security device to fail over to the backup interface:
1.
Right-click a device from the security device Tree or the security device List tab in
the Device Manager and select
Admin
>
Failover
. The Failover Action dialog box
appears.
2.
Click
Force to Failover
.
3.
Click
OK
.
To force a security device to revert to the primary interface:
1.
Right-click a device from the security device tree or the security device List tab in the
Device Manager and select
Admin
>
Failover
. The Failover Action dialog box appears.
2.
Click
Force to Revert
.
3.
Click
OK
.
Setting the RMA State on a Device
If you need to send a device back to the factory and replace it with a new device, you can
set the device to the RMA state. This state allows NSM to retain the device configuration
without a serial number or connection statistics. When you install the replacement device,
all you need to do is activate the device with the serial number of the replacement unit.
NOTE:
The replacement device must be the same platform and OS version as the unit
that is being replaced. Setting the RMA state cannot be undone.
In the RMA state, the device object is functionally identical to a modeled device, but its
status is “RMA” in the Device Monitor.
To set a device to the RMA state:
1.
Right-click a device from the security device tree or security device List tab in the
Device Manager and select
RMA Device
. The Confirm RMA Device dialog box appears.
2.
Click
OK
. In the Device Monitor window, the device status is RMA.
When the replacement device is installed, activate the device with the serial number of
the replacement. For information about activating a device, see “Activating a Device” on
page 132.
301
Copyright © 2010, Juniper Networks, Inc.
Chapter 7: Managing Devices
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...