Device Schemas
The structure of the ADM and the DMs is defined by a DM schema, which lists all the
possible fields and attributes for a type of object or device. The DM schema reads from
a capability file, which lists the fields and attributes that a specific operating system
version supports, to determine the supported features for the operating system version
that is running on the managed devices. NSM uses capability files to enable Juniper
Networks software upgrades without changing the device configuration in NSM.
The device schemas for each of the firmware versions supported for ScreenOS and IDP
devices are built into Network-Security Manager.
Device families introduced in Release 2008.1 and later are described by schemas that
are maintained on a schema repository owned by Juniper Networks. These schemas can
be added dynamically to NSM. These devices include:
•
Devices running Junos OS:
•
J Series Services Routers and SRX Series Services Gateways
•
M Series Multiservice Edge Routers and MX Series Ethernet Services Routers
•
EX Series Ethernet Switches
•
Secure Access products
•
Infranet Controller products
See “Managed Devices” on page 13 for lists of specific models of these products that
support management through NSM.
Unlike schemas for ScreenOS and IDP devices, schemas for these devices can be updated
asynchronously with releases of NSM. You decide when to check for new schemas, which
schemas to download, and when to activate them.
Security
NSM integrates application-level encryption and authentication and uses high-grade
encryption and public-key algorithms to eliminate the need for separate IPsec tunnels
between each device and the management station.
For communication between the UI and the GUI Server, NSM uses Transport Layer Security
(TLS), a cryptographic protocol that provides secure communication.
For communication between the GUI Server, and the Device Server, NSM uses Secure
Server Protocol (SSP), a modified version of TCP that is more reliable than ordinary TCP,
requires less CPU and memory resources from servers, and reduces the number of
acknowledgement packets on the network. SSP uses AES encryption and SHA1
authentication for all connections.
Scaling and Performance
As you add devices or network components to your physical network, you also add them
to your virtual NSM network, where you can manage all future configurations. An NSM
Copyright © 2010, Juniper Networks, Inc.
22
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...