![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 11](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862011.webp)
Configuring the User Record Synchronization Server (NSM Procedure) . . . . . . . 279
Configuring the Client (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Configuring the Database (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Chapter 20
Configuring IF-MAP Federation Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Configuring IF-MAP Servers (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Configuring IF-MAP Client Settings on the Secure Access Device (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Configuring IF-MAP Session Export Policy on the Secure Access Device (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
Configuring IF-MAP Session Import Policy on the Secure Access Device (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Configuring IF-MAP Server Replicas (NSM Procedure) . . . . . . . . . . . . . . . . . . . . 290
Part 4
Managing Secure Access Devices
Chapter 21
Managing Secure Access Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Managing Large Binary Data Files (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . 295
Removing a Secure Access Device from NSM Management (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Archiving Secure Meetings (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Managing Secure Access Node from a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Chapter 22
Troubleshooting Secure Access Device Federated Networks . . . . . . . . . . . 301
Troubleshooting the IF-MAP Federation Network (NSM Procedure) . . . . . . . . . . 301
Part 5
Monitoring Secure Access Devices
Chapter 23
Configuring Logs in Secure Access Devices . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Configuring User Access, Admin Access, Events and Sensors (NSM
Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Configuring Custom Filters and Formats for Log Files (NSM Procedure) . . . . . . 308
Configuring Client-Side Logs (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Configuring Custom Log Filters (NSM Procedure) . . . . . . . . . . . . . . . . . . . . . . . . . 311
Chapter 24
Viewing Logs in Secure Access Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Viewing Device Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
Viewing Device Monitor Alarm Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Monitoring the Secure Access as an SNMP Agent (NSM Procedure) . . . . . . . . . . 317
Part 6
Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
xi
Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...