8.
Enter an admin username for the device admin.
9.
Set the Admin User Password and the First Connection One-Time Password:
•
Select
Set Password
and enter a new password.
•
Confirm your new password and click
OK
.
NOTE:
•
Make a note of the unique external ID. The device administrator will
need it to configure connectivity with NSM. The wizard automatically
enters this value for the device. This ID number represents the device
within the management system.
•
Specify the administrator username and password for the SSH
connection. This name and password must match the name and
password already configured on the device.
•
Specify the First Connection One Time Password (OTP) that
authenticates the device. Make a note of this password. The device
administrator will need it to configure the connectivity with NSM.
10.
Click
Finish
to add the device to the NSM UI. The newly added Secure Access device
appears in the Devices workspace.
Configuring and Activating the NSM agent on the Secure Access Device
You must configure and activate the NSM agent on the Secure Access device. It
establishes the SSH communications with the NSM application and controls the Secure
Access device from the NSM application.
To configure and activate the NSM agent:
1.
Select
System > Configuration > DMI Agent
to add the NSM management application.
2.
Under DMI settings for outbound connections, enter the device server’s IP address in
the Primary Server box.
3.
Enter
7804
in the Primary Port box.
4.
Fill in the Backup Server and Backup Port boxes, if a device server is configured for
high availability.
5.
Enter the unique external ID provided by the NSM administrator in the Device ID box.
6.
Enter the first connection one-time password provided by the NSM administrator in
the HMAC box.
7.
Click
Enable
to activate the NSM agent.
8.
Click
Save Changes
, and the device attempts to establish a session with the NSM
application.
The device software initiates the TCP connection to NSM and identifies itself using the
specified device ID and HMAC. Both sides then engage in SSH Transport Layer interactions
13
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Adding Secure Access Devices
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...