•
Will you add one or many devices?
Additionally, collect the following information about the device:
•
OS and OS version running on the device
•
Port Mode used by the device (some ScreenOS devices only)
The following sections provide details to help you make decisions about adding devices
and determine device information.
Importing Versus Modeling
You must decide if you want to import or model your devices in NSM.
Importing Device Configurations
You can add devices in your existing network into NSM and import their configurations.
Using the Add Device wizard, you configure a connection between the management
system and the physical device, and then import all device parameters, policies, objects,
VPNs, and so on.
After you have imported several devices, you can start using system-level management
features, such as:
•
The policy merge tool (for ScreenOS, J Series, and SRX Series devices) that can merge
several device security policies into a single, efficient policy that is easy to maintain.
•
Device groups, which group devices by function, location, or platform to make updating
easier.
•
The VPN Manager, for creating VPNs across multiple devices quickly.
If you modify a device that supports centralized policy management and import or
reimport the device into NSM, a new policy is automatically created using the following
naming syntax: device_1. (Each new policy increments the name.) Devices are not assigned
to the new policy. If you reimport a device with no changes, then a duplicate policy is not
created.
Importing and Templates
If you assign a template to a device before connecting to and importing the device, later
changes to the template will change values on the device. If you assign a template to a
device after importing it, changes to the template will not change set values on the device
unless you specifically have the template override the existing values.
Modeling Device Configurations
For most new or undeployed device types, you can add and configure the device in NSM,
and then activate the configuration when you are ready to deploy the physical device on
your network.
Before connecting to the device, create a device object (using the Add Device wizard)
that represents the OS and device type of the actual, physical device. Then model the
device configuration in the NSM UI. Configure all device features—zones, interfaces,
virtual routers, policies, logging features. Finally, activate the device (using the Activate
101
Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Adding Devices
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...