•
Dynamic, route-based VPNs—Provide resilient, always-on access across your network.
Add firewall rules on top of route-based VPNs to control traffic flow.
•
Policy-based VPNs—Connect devices, remote access service (RAS) users, and control
traffic flow (you can also create policy-based VPNs with L2TP).
•
Mixed-mode VPNs—Connect route-based VPNs with policy-based VPNs, giving you
flexibility.
Integrated Logging and Reporting
You can use NSM to monitor, log, and report on network activity in
real time
to help you
understand what is happening on your network:
•
View traffic log entries generated by network traffic events, configuration log entries
generated by administrative changes, or create custom views to see specific information
in the Log Viewer.
•
Create detailed reports from traffic log information in the Report Manager.
•
Inspect suspicious events by correlating log information in the Log Investigator.
Monitoring Status
NSM keeps you up-to-date on the health of your network.
•
View critical information about your managed devices in the Device Monitor:
•
Configuration and connection status of your managed devices
•
Individual device details, such as memory usage and active sessions
•
Device statistics
•
View the status of each individual VPN tunnel in the VPN Monitor.
•
View NSRP status in the NSRP Monitor.
•
View the status of your IDP Clusters in the IDP Cluster Monitor.
•
View the health of the NSM system itself, including CPU utilization, memory usage,
and swap status in the Server Monitor.
Job Management
You can view the progress of communication to and from your devices in the Job Manager.
NSM sends commands to managed devices at your request, typically to import, update
or reboot devices, and view configuration and delta configuration summaries. When you
send a command to a device or group of devices, NSM creates a job for that command
and displays information about that job in the Job Manager module.
Job Manager tracks the progress of the command as it travels to the device and back to
the management system. Each job contains:
•
Name of the command
•
Date and time the command was sent
•
Completion status for each device that received the command
9
Copyright © 2010, Juniper Networks, Inc.
Chapter 1: Introduction to Network and Security Manager
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...