4.
Enter the new phone number.
5.
Click
OK.
Linking the Dial-In Profile with the Device
From the Device configuration editor:
1.
Select
Network
>
Interface
>
Edit Serial Interface
>
Modem.
2.
Enter the name of the Dial-in profile in the
Dial-in Name
field.
3.
Click
OK.
Setting the Time-out Period for the Modem Dial-In Authentication
From the Device configuration editor:
1.
Select
Device Admin
>
CLI Management.
2.
Set the time period in the
Modem Dial-In Authentication Time-out
field.
3.
Click
OK.
Configuring Border Signaling Gateway Objects
The Border Signaling Gateway (BSG) handles VoIP signaling in Junos OS based on policies
you set. NSM allows you to define two shared BSG objects in the Object Manager that
can be referenced in the BSG transaction rulebase in the Policy Manager. You can create,
view, edit, and delete the following BSG objects from the Object Manager.
•
BSG Service Point object:
This a polymorphic object for specifying the egress service
point in a transaction term’s route action. With the service point object, you can specify
the device, a gateway in the device, and a service point in the gateway.
•
BSG Admission Controllers:
BSG Admission Controllers control Session Initiation
Protocol (SIP) dialogs and transactions. You can define the following settings for both
dialogs and transactions:
•
Maximum Concurrent Number
This is the maximum number of concurrent dialogs
that are allowed. You can set it from 0 to 100,000. Zero causes all calls to be rejected.
The default setting is 100000
•
Committed Attempts Rate
The maximum number of attempts per second to initiate
an out-of-dialog transaction. You can set it from 0 to 100. The default setting is 100
•
Committed Burst Size
The maximum number of dialogs allowed to burst above the
committed-rate and still be accepted. You can set it from 0 to 200.
You can define one admission controller per gateway, and reference all of the admission
controllers from the BSG transaction rulebase in the Policy Manager. Manager.
Admission controller objects are listed on the transaction policy’s shared-object menu,
where you can drag and drop them into the transaction terms. When you import a
device, the admission controller objects are also imported.
Copyright © 2010, Juniper Networks, Inc.
426
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...