•
Clusters are made up of two or more devices from the same platform and managed
OS version. You configure these as a separate entity. Configuration applied to the
cluster also applies to each cluster member. See “Configuring Clusters” on page 232 for
details on configuring clusters.
•
VPNs provide a cost-effective and secure way for routing private data through the
internet. You can configure devices for inclusion in VPNs either centrally in the VPN
Manager, or in the device object itself. For details about configuring VPNs, see
“Configuring VPNs” on page 543.
•
Vsys devices are virtual devices that exist within a physical ScreenOS security device.
A vsys cluster device is a vsys device that has a cluster as its root device. See “Adding
Vsys Devices” on page 146.
•
Policies are sets of rules that provide a comprehensive plan that determines how the
device behaves on your network. For ScreenOS and IDP devices, you configure policies
within the NSM Policy Manager. For Secure Access, Infranet Controller, and EX Series
devices, you must configure policies in the device. For J Series routers or SRX Series
gateways, you can configure policies either in the NSM Policy Manager or in the device,
but not both. For details about configuring policies, see “Configuring Security Policies”
on page 429.
Configuration Features
You can edit the device object configuration through the device editor, or you can use
templates or configuration files to simplify configuration:
NOTE:
These features edit only the device object in NSM. The newly configured values
will not affect the device itself until you push the modeled configuration to the device
using the Update Device directive. See “Updating Devices” on page 239 for details about
updating devices.
•
About the Device Editor on page 187
•
About Device Templates on page 187
•
About Configuration Groups on page 188
About the Device Editor
To edit the device using the device editor, select
Device Manager > Devices
, select the
device you want to edit, and then click the Edit icon. NSM displays the imported or
modeled configuration parameters of the device, along with information specific to NSM,
like device startup information and the color of the device icon in NSM. The layout of the
screens and the information contained within them depends on the device family and
the specific device platform and operating system version.
See “Editing Devices Using the Device Editor” on page 188 for details.
About Device Templates
A template is a predefined set of configuration values that helps you reuse common
information. A device object can refer to multiple templates, and you can use templates
to configure and deploy multiple devices quickly. A device template looks like a device
187
Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Configuring Devices
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...