Configuration Responsibilities
Some enterprise organizations use different administrator groups to manage specific
aspects of device configuration. Configuration responsibilities might use the following
role structure:
•
IT group—Integrates new devices into the existing network infrastructure. This group
has roles with activities for setting up Layer 2 and Layer 3 aspects of the device (IP
addressing, Routing, VLANs, Syslog, and so on). Within the IT group, the network
administrator might also have a role with an activity for managing the management
system.
•
Security group—Creates and manages security policies. This group has roles with
activities for defining custom services, address objects, and firewall rules on devices
for which they have responsibility.
•
Remote Connectivity group—Creates and manages VPNs and RAS user configuration.
This group has roles with activities for configuring VPNs and remote users.
Specific Tasks
•
Configuration Validation—An audit administrator approves all configuration changes
before those changes are made on the network. Only the auditor has a role with
activities for updating devices on the network.
•
Reporting—A reporting administrator views reports for one or more domains. A regional
reporting administrator has a role with activities for viewing reports for their regional
subdomain; a corporate reporting administrator has a role with activities for viewing
reports for the global domain and all subdomains.
•
Configuration Update—An update administrator updates firmware for devices. The
update administrator has a role with activities for updating firmware on the devices in
their assigned domain.
•
Administrative Management—A management administrator creates administrators
and manages their permissions. The super administrator creates a management
administrator to delegate administrator management. For example, a NOC Tier 2
administrator has a role that includes the activity to create new administrators, but
cannot assign them an activity that is not included in their own role. Typically, a
subdomain has only one management administrator to control the creation of
administrators.
•
Device Installation—A device install administrator creates new devices. The device
install administrator has a role with activities for adding, updating, and viewing device
configurations.
Service Providers
Service Providers can use NSM domain, subdomains, and roles to manage their internal
infrastructure and their customers’ infrastructures.
65
Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring Role-Based Administration
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...