name and version, IP address, and device administrator name, and then uses that
information to detect the device. You can then choose to modify the displayed name of
the device and assign a color to the device. If the host name is not unique within NSM or
is undetected, the Add Device wizard generates a validation error, forcing you to add a
valid device name in order to proceed with adding the physical device to the Device
Server.
After the physical device connects, it is considered to be a
managed device
, meaning it
is now under the control of NSM.
Verifying Device Configuration
For managed devices that use imported device configurations, you should verify that all
device information was imported correctly. To identify any discrepancies, you can generate
a summary of the differences between the physical device configuration and the NSM
device configuration. This summary is known as a Delta Config summary. It is also a good
idea to check your imported security policies, objects, and VPNs to become familiar with
how the NSM UI displays them. The Delta Config summary is available for all devices
supported by NSM except IDP devices.
For managed devices that use modeled device configurations, you should verify that all
device information was pushed to the physical device correctly. To identify discrepancies,
generate a summary of the device configuration running on the physical device. This
summary is known as a Get Running Config summary.
Managing the Device
After adding a device, you can manage its configuration, objects, and security policies in
the UI. You can also view traffic log entries for your device in the Log Viewer, view
administrative log entries in the Audit Log Viewer, and monitor the status of your devices
in the Realtime Monitor.
You can also delete devices from NSM, and reimport them if necessary. Deleting a device
removes all device configuration information from the management system, but might
be the best solution if you need to perform extensive troubleshooting or reconfigure the
device locally. After you have made the necessary changes locally, you can then reimport
that device into NSM. However, during reimport, NSM imports all device configuration
data—not just the data that was changed; any changes that exist in the modeled
configuration are lost during reimport. Additionally, after reimporting a device
configuration, you must reassign the imported policy to the device.
If you delete a device that was added using Rapid Deployment (see “Using Rapid
Deployment (ScreenOS Only)” on page 139), you must also re-create the configlet and
install it again on the device.
Before You Begin Adding Devices
Before adding a device to NSM, decide the following:
•
Will you import or model the device?
•
Will the device reside in the global domain or a subdomain?
Copyright © 2010, Juniper Networks, Inc.
100
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...