Using NSM, you can identify the changes made to the device or to the modeled
configuration, and then update the device. For significant changes to the network that
the security device is deployed in, you might also need to change the assigned policy.
The following sections explain how to detect configuration or policy changes:
•
Verifying Device Status in Device Monitor on page 245
•
Verifying Device Status in Device Manager on page 247
•
Reviewing Logs on page 247
•
Identifying Administrative Changes on page 248
•
Reviewing Reports on page 248
Verifying Device Status in Device Monitor
Within the management system, a managed device has an associated connection status
and configuration status. NSM displays each status for each managed device in RealTime
Monitor > Device Monitor.
For more details on using the Device Monitor, see “Monitoring Managed Devices” on
page 650.
Connection Status
The connection status indicates the status of the connection between the managed
device and the Device Server. NSM uses heartbeat packets to continually test the
connection between the Device Server and the physical device. The connection status
column in the Device Monitor displays the current status of the device:
•
Up status—The device is connected to the Device Server and is running properly. Before
you can update a device, it must be in the Up state.
•
Down status—An event has occurred, either manually by an administrator or
automatically by the flow of a type of traffic, that has stopped the device from running.
•
Never Connected status—The device has not made an initial connection to Device
Server. Typically, this state appears for modeled devices that have not been activated,
or for devices waiting to be activated using Rapid Deployment.
Configuration Status
The configuration status indicates the status of the device configuration on the physical
device. Some common configuration states include:
•
Managed—The running configuration is the same as the modeled configuration (the
device is using a “managed” configuration).
•
Modeled—The running configuration is not the same as the modeled configuration,
and the device has not yet connected to NSM.
•
Import Needed—The running configuration is not the same as the modeled
configuration, but the device has connected to NSM and is awaiting manual import.
•
Update Needed—Indicates that the running configuration is not the same as the
modeled configuration, and the device is connected to NSM. You must update the
245
Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Updating Devices
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...