For details about configuring the device features for all supported ScreenOS and IDP
platforms, see the
Configuring Screen OS Devices Guide
(
http://www.juniper.net/techpubs/en_US/nsm2010.3/information-products/pathway-pages
/screenos-devices/index.html
) or the
Configuring Intrusion Detection Prevention Devices
Guide
(
http://www.juniper.net/techpubs/en_US/nsm2010.3/information-products/pathway-pages
/intrusion-detection-prevention-devices/index.html
).
Unsupported Changes
Some device configurations can be performed only by the device administrator using the
CLI or Web UI. An NSM administrator cannot perform the following device configurations
in the Device Manager:
•
Configuring functions that are only applicable for the device administrator, such as
setting initial IKE contact, audible alarms, MAC addresses, or console operations.
•
On standalone IDP Sensors, configuring Sensor mode (sniffer, transparent, and so on),
port speed and duplex settings, virtual routers, and other settings. See the
IDP Installer’s
Guide
,
IDP Concepts and Examples Guide
, and
IDP ACM Help
for more information.
•
Configuring functions that require device administrator intervention, such as Secure
Command Shell (SCS) and Secure Shell (SSH) client operation.
•
Executing debugging commands.
Changes that Affect the Management Connection
Some configuration changes to a managed device can affect the NSM connection to the
device when you update the device, such as:
•
Changing the connection method (Telnet or SSH) used between the NSM Device
Server and the managed device.
•
Disabling the ability of the managed device to communicate with the NSM Device
Server.
•
Changing the IP address of the NSM Device Server on the managed device.
•
Changing the interface on the managed device that is permitted to receive NSM
management traffic.
•
Changing the VPN that handles traffic between the managed device and the NSM
Device Server.
•
Modifying router information on the managed device.
•
Changing security policy rules on the managed device that cause NSM traffic to be
dropped.
If you need to make any of the above changes to the managed device, use the Web UI
or CLI to make the changes locally, and then reimport the device configuration into the
NSM UI.
193
Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Configuring Devices
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...