Example: Creating, Activating, and Updating a Cluster with Modeled Cluster
Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Adding the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Modeling the Cluster Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Activating the Cluster Members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Updating the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Adding a Vsys Cluster and Vsys Cluster Members . . . . . . . . . . . . . . . . . . . . . 165
Example: Adding a Vsys Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Adding Multiple Devices Using Automatic Discovery (Junos, SA, and IC Devices
) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Adding a Device Discovery Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Running a Device Discovery Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Adding Many Devices Using CSV Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Creating the CSV File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Devices with Static IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Device with Dynamic IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Undeployed Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Validating the CSV File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Importing Many Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Adding and Importing Many Devices with Static IP Addresses . . . . . . . 178
Adding and Importing Many Devices with Dynamic IP Addresses . . . . . 178
Modeling Many Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Using Rapid Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Modeling and Activating Many Devices with Configlets . . . . . . . . . . . . . 180
Activating Many Devices with Configlets . . . . . . . . . . . . . . . . . . . . . . . . . 181
Adding Device Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Example: Creating a Device Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
Setting Up NSM to Work With Infranet Controller and Infranet Enforcer . . . . . . . 183
Avoiding Naming Conflicts of the Authorization Server Object . . . . . . . . . . . 183
Avoiding NACN Password Conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Chapter 5
Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
About Device Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
About Configuring Device Families . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
About Configuring Clusters, VPNs, Vsys Devices, Policies, and Shared
Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Configuration Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
About the Device Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
About Device Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
About Configuration Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Editing Devices Using the Device Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Validation and Data Origination Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Configuring Device Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Configuring ScreenOS/IDP Device Features . . . . . . . . . . . . . . . . . . . . . . 194
Configuring Secure Access or Infranet Controller Device Features . . . . 196
Configuring Junos Device Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Updating the Configuration on the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Copyright © 2010, Juniper Networks, Inc.
xii
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...