Before you can activate a cluster member in NSM, the device administrator must have
already created the cluster and added, configured, and enabled the physical cluster
member. See the
Secure Access Administration Guide
or the
Unified Access Control
Administration Guide
for details on creating and configuring these clusters.
Secure Access or Infranet Controller devices configured in a cluster must have a cluster
object and member objects defined in NSM before Secure Access or Infranet Controller
cluster nodes can be recognized by NSM. Nodes from this cluster that subsequently
contact NSM will be represented by fully functional member icons in the Cluster Manager.
Cluster members whose NSM agents do not contact NSM will be displayed in NSM device
monitor as unconnected devices.
Secure Access or Infranet Controller devices use member IDs to identify each cluster
member object. When importing cluster members, the member ID is imported as part of
the cluster, so the Add Cluster Member wizard does not prompt for the member ID.
To add a Secure Access or Infranet Controller cluster to NSM, first add the cluster object,
and then add its members. You add cluster members one at a time, in a similar manner
to adding standalone devices. You can add and import devices with dynamic IP addresses.
NSM does not support importing Secure Access or Infranet Controller cluster members
with static IP addresses.
NOTE:
Adding a cluster and adding a cluster member have no effect on the
cluster itself. The cluster and cluster members must already exist.
Once a Secure Access or Infranet Controller cluster is managed by NSM, subsequent
changes applied to the cluster by NSM will be synchronized by the cluster across all
cluster members. Similarly, changes to Secure Access or Infranet Controller cluster
membership that occur via administrator action on the native device UI will be reflected
back to NSM, and NSM will display the modified cluster.
For an examples of adding clusters in NSM, see “Example: Adding and Importing a Cluster”
on page 159.
Adding and Importing a Secure Access or Infranet Controller Cluster through
Unreachable Workflow
If the cluster is already installed and configured on the network, then you can add and
import that cluster into NSM.
1.
On each cluster member device, configure NSM administrator logon credentials.
2.
In NSM, add the cluster object using the Add Cluster wizard.
In the Device Manager, select
Devices
, click the Add icon and select
Cluster
from the
list. Provide the cluster name, color of the icon, OS name, platform, and managed OS
version. The OS name, platform, and OS version must match those on the physical
devices.
3.
In NSM, add each cluster member.
Copyright © 2010, Juniper Networks, Inc.
154
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...