Using Configuration Groups
Configuration groups are a Junos concept that you can use in NSM to help speed
configuration of Junos devices.
In Junos, configuration groups allow you to create a group containing Junos device
configuration statements and to direct the inheritance of that group’s statements in the
rest of the configuration. The same group can be applied to different sections of the
configuration, and different sections of one group’s configuration statements can be
inherited in different places in the configuration.
In NSM, you can create configuration groups in the UI. The configuration data you provide
in the UI becomes configuration statements when you push the configuration to the
Junos device,
Configuration groups allow you to create smaller, more logically constructed configuration
files, making it easier to configure and maintain the Junos device configuration. For
example, you can group configuration information that is repeated in many places in the
configuration, such as when configuring interfaces, and thereby limit updates to just the
group.
You can also use wildcards in a configuration group to allow configuration data to be
inherited by any object that matches a wildcard expression.
The configuration group mechanism is separate from the grouping mechanisms used
elsewhere in the Junos configuration, such as Border Gateway Protocol (BGP) groups.
Configuration groups provide a generic mechanism that can be used throughout the
configuration.
Configuration groups use true inheritance, which involves a dynamic, ongoing relationship
between the source of the configuration data and the target of that data. That is, a live
relationship exists between the configuration group and the device object. Any change
in the configuration group immediately takes effect in the device object.
Data values changed in the configuration group are automatically inherited by the target.
The target need not contain the inherited information, although the inherited values can
be overridden in the target without affecting the source from which they were inherited.
NSM enables you to create, edit, and view configuration group definitions. Specifically,
NSM supports the following operations related to configuration groups:
•
Create, edit, and view configuration group definitions.
•
Display the effective value of applying the configuration group.
•
Identify the origin of values derived from configuration groups; that is, identify which
configuration group a value came from.
•
Support the specification of configuration groups in templates. See “Using Configuration
Groups with Templates” on page 228 for details.
221
Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Configuring Devices
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...