d.
Copy and paste these commands into a text file,
e.
Click
Finish
to complete the Add Device wizard and include the new device in
the Device Manager list.
7.
Log into the device as root and run the commands.
8.
Check the device configuration status (mouse over the device in Device Manager or
check in Device Monitor):
•
The status message “Waiting for 1st connect” might display briefly.
•
After the device connects, the status displays “Import Needed”, indicating that
the device has connected but the management system has not imported the
device configuration yet.
9.
Import the device configuration by right-clicking the device and selecting
Import
Device
. The Job Information box displays the job type and status for the import;
when the job status displays successful completion, click
Close
.
After the import finishes, double-click the device to view the imported configuration.
To check the device configuration status, mouse over the device in Device Manager (you
can also check configuration status in Device Monitor). The device status displays as
“Managed”, indicating that the device has connected and the management system has
successfully imported the device configuration.
The next step is to verify the imported configuration using the Device Monitor or the
Device Manager. See “Verifying Imported Device Configurations” on page 127 for details.
Adding and Importing an Infranet Controller or Secure Access Device
The procedure for importing a device with an unknown IP address is the same for Secure
Access and Infranet Controller devices. This procedure requires specific actions to be
taken on the a Secure Access or Infranet Controller device in addition to those taken in
the NSM UI.
Because Secure Access and Infranet Controller configurations can be large, some large
binary data files are not imported with the rest of the configuration. A stub is placed in
the device configuration tree instead. If you need to manage these files in NSM, you must
import them later as shared objects, and then create links to those shared objects from
the device configuration tree. See “Managing Large Binary Data Files (Secure Access and
Infranet Controller Devices Only)” on page 271 for details.
NOTE:
Secure Access devices are more commonly configured as clusters. See “Adding
Clusters” on page 151 for details.
The following sections explain how to add a Secure Access or Infranet Controller device:
•
Install and Configure the Secure Access or Infranet Controller Device on page 122
•
Add the Device in NSM on page 122
121
Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Adding Devices
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...