NOTE:
If you delete an IC or EP device, all related IC-EP associations are
removed from the UAC Manager, and the configuration in the device is not
modified. Therefore, first remove IC-EP and 802.1X port associations from
the UAC Manager before you delete an IC or EP. This ensures that
configuration changes take effect in the device.
Disassociating Enforcement Points from an Infranet Controller in the UAC Manager
To disassociate Enforcement Points (EP) from a selected Infranet Controller (IC):
1.
Select from the EP table the EPs to disassociate from the IC.
2.
Select the Delete button (-) above the Enforcement Points table.
3.
Select the check box to run an Update Device task, which pushes configuration changes
on both the IC and EPs. The configuration status of the EPs changes to Managed,
InSync.
4.
Select the check box to run a Summarize Delta Config task that ensures the association
between the IC and EP in the application database. The configuration status of these
devices becomes Managed, NSM Changed.
5.
Select OK. The selected EPs are removed from the IC.
Resolving Configuration Conflicts with the Infranet Controller in the UAC Manager
Before you resolve configuration conflicts, perform an "Import Device" to identify the
actual conflicts in the configuration. To ensure that configurations made in the Infranet
Controller (IC) device are reflected in the UAC Manager:
1.
Select an IC and right-click on it
2.
Select
Resolve Config Mismatch
from the dropdown menu. The Resolve Config
Mismatch window opens displaying differences between the RADIUS client
configuration in the IC and the administered data in the UAC Manager.
3.
Verify whether data currently administered in NSM by the UAC Manager is consistent
with data in the RADIUS client device configuration.
4.
Provide shared secret and IC port details. You cannot update information without this
information.
5.
Select the action to be performed:
•
Select
Update UAC Manager
to update the UAC Manager data with the data from
the IC.
•
Select
Update the Enforcement Point Association in the Infranet Controller
to update
the data in the IC with data from the UAC Manager.
6.
Select the check box to overwrite the shared secret in the device.
653
Copyright © 2010, Juniper Networks, Inc.
Chapter 16: Unified Access Control Manager
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...