g.
(ScreenOS only) Transparent Mode—Enable transparent mode, if desired.
h.
(Some ScreenOS only) License Model—Specify baseline or advanced.
3.
Click
OK
to create the cluster object.
The cluster device object appears in the device tree.
Adding Members to the Cluster
After creating the cluster object, add the members of the cluster. In Device Manager,
select
Devices
, right-click the Cluster device, and then select
New
>
Cluster Member
.
The Add Cluster Member wizard appears. Follow the instructions in the wizard to import
or add a new cluster member.
Adding ScreenOS or IDP Clusters
To add a ScreenOS or IDP cluster, first add the cluster object as described in “Adding
Clusters” on page 151. Next, add each cluster member either by importing or by modeling:
•
When importing cluster members, first ensure that their configurations are synchronized.
Next, right-click the cluster icon in the Device Manager and select
New > Cluster
Member
form the list and select the appropriate options to import the device
configurations from each physical cluster device member.
•
When modeling a cluster member, ensure that both cluster members have been added
to the cluster device object before configuring the cluster.
By default, the cluster propagates settings made in one device member to the other
device member. However, the following settings are not propagated and must be
configured on each device in the cluster: VSD group, VSD priority, authentication and
encryption passwords, managed IP addresses, and IP tracking settings. All other
commands are propagated among devices within the cluster.
For details on creating and configuring a ScreenOS cluster, see
Network and Security
Manager Configuring ScreenOS and IDP Devices Guide
.
To create a cluster that includes an existing device (with an existing configuration and
security policy) and a new device (with no configuration or security policy), you should:
1.
Create the cluster.
2.
Add the existing device by importing. The Add Device Wizard automatically imports
the device configuration.
3.
Add the new device by modeling.
4.
When the device is ready, activate the device.
Adding Secure Access or Infranet Controller Clusters
To add a Secure Access or Infranet Controller cluster in NSM, you add the cluster and
then add each member. Adding a member is similar to adding a standalone device.
Copyright © 2010, Juniper Networks, Inc.
152
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...