Adding and Importing a Secure Access or Infranet Controller Cluster through
Unreachable Workflow
If the cluster is already installed and configured on the network, then you can add and
import that cluster into NSM.
1.
On each cluster member device, configure NSM administrator logon credentials.
2.
In NSM, add the cluster object using the Add Cluster wizard.
In the Device Manager, select
Devices
, click the Add icon and select
Cluster
from
the list. Provide the cluster name, color of the icon, OS name, platform, and managed
OS version. The OS name, platform, and OS version must match those on the physical
devices.
3.
In NSM, add each cluster member.
Right-click the cluster icon in the Device Manager, select
New > Cluster Member
,
and follow the instructions in the Add Cluster Member wizard. When prompted,
select
Device Is Not Reachable
to add an existing device with a dynamic IP address.
The last step in adding the cluster member prompts you to continue adding cluster
members. Select this option if you have more members to add; unselect it if you are
done adding members.
4.
On each cluster member device, configure and activate the NSM agent and establish
an SSH session with NSM.
5.
Import the cluster.
In the Device Manager, open the cluster icon, right-click on one cluster member and
select
Import Device
from the list. You do this only once and for the entire cluster
because the configuration is identical for all cluster members.
After importing, the configuration appears at the cluster level in NSM. To edit the
configuration, open the cluster icon, not the individual cluster members.
Because Secure Access and Infranet Controller configurations can be large, some large
binary data files are not imported with the rest of the configuration. A stub is placed in
the device configuration tree instead. If you need to manage these files in NSM, you must
import them later as shared objects, and then create links to those shared objects from
the device configuration tree. See “Managing Large Binary Data Files (Secure Access and
Infranet Controller Devices Only)” on page 271 for details.
Adding and Importing a Secure Access or Infranet Controller Cluster through
Reachable Workflow
To add a cluster member:
1.
From the left pane of the NSM UI, click
Configure
.
2.
Expand Device Manager and select
Devices
. The Devices workspace appears on the
right side of the screen.
3.
Click the
Device Tree
tab, and select the cluster to which you want to add the
members.
Copyright © 2010, Juniper Networks, Inc.
154
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...