Using Configuration Summaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Modeling Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Modeling a Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Creating a Device Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Activating a Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Devices with Static IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Devices with Dynamic IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Using Rapid Deployment (ScreenOS Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Creating the Configlet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Installing the Configlet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Preparing the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Installing the Configlet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Updating the Device Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Summarize Delta Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Example: User Successfully Selects and Updates Two Devices with
Delta Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Example: User Selects Two Devices with Delta Option and One Device
Fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Example: User Selects Two Devices to Update Without the Delta
Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Example: User Selects Two Devices to Update with the Delta Option,
But Has no Admin Privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Adding Vsys Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Placing the Root Device in a Global Domain or a Subdomain . . . . . . . . . . . . 147
Importing Vsys Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Modeling Vsys Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Adding L2V Root Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Adding an Extranet Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Adding Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Adding a Cluster Device Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Adding Members to the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Adding ScreenOS or IDP Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Adding Secure Access or Infranet Controller Clusters . . . . . . . . . . . . . . . . . . 153
Adding and Importing a Secure Access or Infranet Controller Cluster
through Unreachable Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Adding and Importing a Secure Access or Infranet Controller Cluster
through Reachable Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Adding Clusters of Routers Running Junos OS . . . . . . . . . . . . . . . . . . . . . . . . 156
Adding and Importing a Junos Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Adding a Junos Cluster with Modeled Cluster Members . . . . . . . . . . . . . 157
Activating and Updating a Modeled Junos Cluster . . . . . . . . . . . . . . . . . 158
Example: Adding and Importing a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Adding the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Adding the Cluster Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Importing the Cluster configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
xi
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...