•
Activities are predefined tasks within NSM. The NSM administrator can combine multiple
activities into a custom role.
NOTE:
You cannot define a custom activity.
With role-based administration, you can specify who has what permissions for NSM
functionality for the entire NSM system, a single domain, or even specific functionality
within a domain. You can even delegate NSM administrator management, enabling
existing NSM administrators to create other NSM administrators, assign domains, and
define or create roles.
NOTE:
A device administrator is the person responsible for managing a device directly,
using the command line or GUI for the local OS (ScreenOS, Junos, IC, or SA). If a device
administrator uses only the local OS command line or GUI to manage devices, do not
create an NSM administrator account for the device administrator; however, if a device
administrator uses both the local OS and NSM to manage devices, you must create an
NSM administrator account for the device administrator.
Using Role-Based Administration Effectively
The structure of your NSM domains should reflect both your existing network structure
and your desired permission structure.
•
Network Structure—Use multiple domains to segregate large, geographically distant
networks into locally managed sections.
•
Permission Structure—Use multiple domains to segregate critical devices and systems
from less important network areas, and then restrict administrator access to devices
in the critical domain.
Your organization probably already has an existing permission structure that is defined
by job titles, responsibilities, and geographical access to your security devices. You can
re-create this same permission structure in NSM.
Role-based administration is particularly useful for Enterprise and Service Provider
organizations that have different administrative roles associated with managing a large
network and security infrastructure. RBA is also helpful for any size of organization that
wants to provide access to other device statistics to non-administrators within the
organization, such as creating a role for the CIO to access reports.
Enterprise Organizations
Each enterprise defines administrative roles differently. With NSM, you have the flexibility
to create the appropriate permission level.
Geographical Divisions
To manage large, geographically diverse networks, you can create domains for each
separate geographical location. Typically, the larger the Enterprise, the deeper and more
63
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring Role-Based Administration
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...