Juniper Networks IC Series Unified Access Control Appliances
In a Unified Access Control (UAC) solution, Infranet Controller (IC) products provide
policy management. ScreenOS firewalls can provide the enforcement points.
Table 12 on page 21 lists the Infranet Controller products and firmware versions supported
by NSM 2010.3.
Table 12: IC Series UAC Appliances NSM Supports
Versions of Firmware NSM Supports
Security Device
IC Release 2.2, 3.0, 3.1
Juniper Networks Infranet Controller
4000
IC Release 2.2, 3.0, 3.1
Juniper Networks Infranet Controller
4500
IC Release 2.2, 3.0, 3.1
Juniper Networks Infranet Controller
6000
IC Release 2.2, 3.0, 3.1
Juniper Networks Infranet Controller
6500
Extranet Devices
Your managed network can also include extranet devices, which are firewalls or VPN
devices that are not Juniper Networks security devices.
Distributed Data Collection
The distributed data collection system provides a robust method for managing multiple
objects. Each device is described by a unique Data Model (DM) that contains all the
configuration data for that individual device. The Abstract Data Model (ADM) contains
configuration data for all objects in a specific domain. When you use the UI to interface
with your managed devices, the ADM and DMs work together:
•
When you update a device configuration, the GUI Server translates the objects and
object attributes in the ADM domain into device configuration information in a DM. The
Device Server then translates the device configuration information in the DM into CLI
commands and sends the commands to the device for ScreenOS devices. For DMI
based devices, Device Server converts the DM into XML configlet and sends the configlet
through NetConf protocol to the device.
•
When you import a device configuration, for ScreenOS devices, the device sends CLI
commands to the Device Server, which translates the CLI commands into a DM with
device configuration information. For DMI devices, the device sends the configuration
through NetConf protocol as an XML document to the Device Server, which translates
it into a DM with device configuration information. The GUI Server then translates the
device configuration in the DM into objects and object attributes in the ADM, and uses
the ADM to display current information in the UI.
For more details on the ADM and DMs, see “Managing Devices” on page 261.
21
Copyright © 2010, Juniper Networks, Inc.
Chapter 1: Introduction to Network and Security Manager
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...