be the best solution if you need to perform extensive troubleshooting or reconfigure the
device locally. After you have made the necessary changes locally, you can then reimport
that device into the NSM system.
For details on adding devices, see “Adding Devices” on page 97.
Modeling New Devices
For new networks or networks that do not use a previously deployed Juniper Networks
device, you should review your network topology thoroughly and design a security system
that works for your organization.
When creating a new security network using NSM:
1.
Create the domain structure that best suits your network topology and access
requirements.
2.
Create NSM administrators and set their permission level by creating and assigning
roles. See “Configuring Role-Based Administration” on page 61 for details.
3.
Add your devices and model their device configurations in NSM.
•
Use templates to configure multiple devices. Templates help you reuse common
information to quickly create configurations for similar devices.
•
For ScreenOS 5.x and later devices, you can use Rapid Deployment (RD) to deploy
multiple devices in nontechnical locations. Use RD to stage and configure devices
quickly, and then simultaneously update all devices with policies to control traffic
as desired in multiple locations.
NOTE:
Secure Access and Infranet Controller devices must be imported into NSM.
4.
Create the objects used in your security policies. These objects might include:
•
NAT objects for policy-based network address translation
•
Address objects for your network components
•
Service objects for your custom network services (NSM includes an object database
of common transport and application-level services)
•
AV objects for detecting viruses in your network traffic
•
GTP objects for inspecting GTP packets
For details about creating objects, see “Configuring Objects” on page 317.
5.
Create security policies.
NSM integrates policy management, linking multiple devices to one security policy
that defines the type of traffic permitted on the network and how that traffic is
treated inside the network.
43
Copyright © 2010, Juniper Networks, Inc.
Chapter 2: Planning Your Virtual Network
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...