Additionally, collect the following information about the device:
•
OS and OS version running on the device
•
Port Mode used by the device (some ScreenOS devices only)
The following sections provide details to help you make decisions about adding devices
and determine device information.
Importing Versus Modeling
You must decide if you want to import or model your devices in NSM.
Importing Device Configurations
You can add devices in your existing network into NSM and import their configurations.
Using the Add Device wizard, you configure a connection between the management
system and the physical device, and then import all device parameters, policies, objects,
VPNs, and so on.
After you have imported several devices, you can start using system-level management
features, such as:
•
The policy merge tool (for ScreenOS, J Series, and SRX Series devices) that can merge
several device security policies into a single, efficient policy that is easy to maintain.
•
Device groups, which group devices by function, location, or platform to make updating
easier.
•
The VPN Manager, for creating VPNs across multiple devices quickly.
If you modify a device that supports centralized policy management and import or
reimport the device into NSM, a new policy is automatically created using the following
naming syntax: device_1. (Each new policy increments the name.) Devices are not assigned
to the new policy. If you reimport a device with no changes, then a duplicate policy is not
created.
Importing and Templates
If you assign a template to a device before connecting to and importing the device, later
changes to the template will change values on the device. If you assign a template to a
device after importing it, changes to the template will not change set values on the device
unless you specifically have the template override the existing values.
Modeling Device Configurations
For most new or undeployed device types, you can add and configure the device in NSM,
and then activate the configuration when you are ready to deploy the physical device on
your network.
Before connecting to the device, create a device object (using the Add Device wizard)
that represents the OS and device type of the actual, physical device. Then model the
device configuration in the NSM UI. Configure all device features—zones, interfaces,
virtual routers, policies, logging features. Finally, activate the device (using the Activate
Device wizard) by configuring a connection between the management system and the
physical device, and then update the modeled configuration to the device.
101
Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Adding Devices
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...