![Juniper NETWORK AND SECURITY MANAGER Manual Download Page 268](http://html1.mh-extra.com/html/juniper/network-and-security-manager/network-and-security-manager_manual_2032862268.webp)
Assigning a Proxy Server an Auto-Update Server (NSM Procedure)
To use a proxy server as an auto-update server:
1.
In the navigation tree, select
Device Manager
>
Devices
. Click the
Device Tree
tab,
and then double-click the Secure Access device for which you want to use the proxy
server as an auto-update server.
2.
Click the
Configuration
tab and select
Authentication > Endpoint Security > Host
Checker
.
3.
Click either
Virus signature version monitoring
or
Patch Management Info Monitoring
.
4.
Select either
Auto-update virus signatures list
or
Auto-update Patch Management
data
.
5.
Configure settings as described in Table 69 on page 250.
6.
If your proxy server is password protected, type the username and password of the
proxy server.
7.
Click one:
•
OK
—Saves the changes.
•
Cancel
—Cancels the modifications.
Table 69: Proxy Server as Auto-Update Server details
Your Action
Options
Specifies the existing URLs of the staging sites where the current lists are stored. The
default URLs are the paths to the Juniper Networks staging site:
https://download.juniper.net/software/av/uac/epupdate_hist.xml
https://download.juniper.net/software/hc/patchdata/patchupdate.dat
Download path
Specifies how often you want the device to automatically import the current list(s).
Download interval
Enter your Juniper Networks Support credentials.
Username and Password
Select the check box to enable this feature.
Use Proxy Server
Enter the IP address of your proxy server.
IP Address
Enter the port that the Juniper Networks Support site will use to communicate with
your proxy server.
Port
Related
Documentation
•
Configuring Virus Signature Version Monitoring (NSM Procedure) on page 248
•
Importing Virus Signature Version Monitoring or Patch Management Version Monitoring
List (NSM Procedure) on page 249
Copyright © 2010, Juniper Networks, Inc.
250
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...