A delta configuration summary shows you the differences between the configuration
you see in the NSM UI and the configuration on the physical device. To get a delta
configuration summary in NSM, from the Devices menu click
Configuration
and select
Summarize Delta Config
. The Get Delta Config Summary dialog box appears with a list
of devices to which you have access. Select the device you just imported and click
OK
.
NSM queries the physical device to obtain a list of all CLI commands or XML messages
used in the device configuration, compares that list with the UI device configuration, and
generates a summary report of all differences, or deltas, discovered.
For a just-imported device, the delta config summary displays minimal deltas, meaning
that very few differences exist between the configuration on the physical device and the
configuration in the UI. NSM automatically imports your VPNs and displays the VPN
policies; however, NSM does not create VPN abstractions for your VPN policies.
Get Running Configuration
A running configuration summary shows you the exact CLI commands or XML messages
that were used to create the current device configuration on the physical device. To get
the running config summary in the NSM application, from the Devices menu click
Configuration
and select
Get Running Config
. The Get Running Config dialog box appears.
You see a list of devices to which you have access. Select the device you just imported
and click
OK
.
NSM queries the physical device to obtain a list of all CLI commands used in the device
configuration and generates a summary report that lists those commands. For a
just-imported device, the get running config summary report displays the device
configuration currently running on the physical device.
Related
Documentation
•
Adding a Secure Access Cluster Overview on page 23
•
Adding a Secure Access Cluster with Imported Cluster Members on page 24
•
Creating and Applying a Secure Access Device Template on page 29
•
Importing Multiple Secure Access Devices on page 16
21
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Adding Secure Access Devices
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...