•
Merging Policies on page 56
•
Using a Naming Convention on page 56
Using Device Groups
You can create groups of devices to manage multiple devices at one time. Group your
device by region, device type, or even OS version, and then use the groups to:
•
Deploy new or updated device configurations to the entire device group.
•
Deploy new or updated policies to the entire device group.
•
Create reports using the log information from the entire device group.
Using Device Templates
A template is a predefined device configuration that helps you reuse common information.
A domain can contain multiple templates, and you can use templates to quickly configure
and deploy multiple devices. A device template looks much like a device configuration—the
template page displays boxes for interfaces, zones, and virtual routers in which you can
enter values. When you add a new device that uses similar information as a previously
added device, you can use a device template to fill in specific configuration values so you
do not have to reenter information.
For example, you might create a generic NetScreen-5GT device template that you can
use each time you add a device of that type. Or you can apply multiple templates to the
same device. You can map a maximum of 63 templates to the same device; you set the
priority of the template to determine the order in which they applied.
For example, you might create the following templates:
•
DNS setting template
•
Default PKI Settings template
•
Authentication template
Apply these templates to a single device to instantly configure the DNS, PKI, and
Authentication settings for the device.
NOTE:
You cannot create VPNs between devices in different domains.
For details about device templates, see “Using Device Templates” on page 196.
Using Configuration Groups
Configuration groups are similar to device templates in that you define configuration
data to be used multiple times. Configuration groups, which are used only in Junos devices,
are different in that the configuration data is used within the same device but at several
levels in the configuration. A special use of configuration group is to apply configuration
data in different members of a cluster.
For details about configuration groups, see “Using Configuration Groups” on page 221.
55
Copyright © 2010, Juniper Networks, Inc.
Chapter 2: Planning Your Virtual Network
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...