![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 25](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862025.webp)
CHAPTER 2
Secure Access Device and NSM
Installation Overview
•
Secure Access Device Installation Overview on page 7
•
NSM Installation Overview on page 7
Secure Access Device Installation Overview
Before beginning, see the
Juniper Networks Security Products Safety Guide
for important
safety information.
You can install the Secure Access device and start configuring your system using the
following steps:
1.
Rack mount the Secure Access device.
2.
Install the hardware.
3.
Perform basic setup.
4.
License and configure your Secure Access device.
See the
Quick Start Guide for Secure Access 2500, 4500 and 6500 Guide
to install and
configure a Secure Access device.
Related
Documentation
NSM Installation Overview on page 7
•
•
Communication Between a Secure Access Device and NSM Overview on page 3
NSM Installation Overview
NSM is a software application that enables you to integrate and centralize management
of your Juniper Networks environment. You need to install two main software components
to run NSM: the NSM management system and the NSM user interface (UI).
See the
Network Security Manager Installation Guide
for the steps to install the NSM
management system on a single server or on separate servers. It also includes information
on how to install and run the NSM user interface. The
Network Security Manager Installation
Guide
is intended for IT administrators responsible for installing or upgrading to the NSM.
7
Copyright © 2010, Juniper Networks, Inc.
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...