Running a Device Discovery Rule
To run a device discovery rule:
1.
In the Configure pane of the NSM navigation tree, click
Device Discovery Rules
.
2.
Select the rule you want to run.
3.
Click the Run icon in the discovery rules toolbar.
The device discovery Progress dialog box appears.
NSM pings each IP address in the specified range to see which ones it can reach, and
then runs the rule against each reachable device. When it finds a device that satisfies
the rule, it displays a dialog box containing an SSH key for you to verify.
4.
Accept the SSH key. The device automatically connects with NSM and NSM imports
the device configuration.
The Device Discovery Progress box shows which devices were added, devices that
were found but could not be added, and at what stage in the discovery process the
device add process failed.
Adding Many Devices Using CSV Files
If your network includes a large number of devices, you can save time by adding multiple
devices in a single workflow using the Add Many Device wizard.
With the wizard, you can add up to 4000 devices at a time to a single domain (you cannot
add multiple devices to different domains at one time). Additionally, for some types of
ScreenOS devices, you can create configlets to activate rapidly your newly deployed
security devices. However, you cannot configure Rapid Deployment for Secure Access
devices, Infranet Controller devices, or devices running Junos OS. Neither can you configure
RD when adding multiple ScreenOS security devices that are systems (NetScreen-500,
NetScreen-5000, ISG1000, ISG2000).
NOTE:
You cannot use the Add Many Devices wizard to add clusters or cluster members,
EX Series Ethernet Switches configured as a virtual chassis or an SRX virtual chassis.
Adding many devices is a three-step process:
1.
Create the CSV file.
This file defines all the required and optional values for each device.
2.
Use the Add Many Devices wizard to select the CSV file to import or model the
devices.
The wizard validates the CSV file, notifies you of any errors, and then adds the devices
for which all defined values are valid.
•
When importing devices with static IP addresses, the device configuration is
automatically imported during the Add Many Devices workflow.
Copyright © 2010, Juniper Networks, Inc.
168
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...