mode and the L2V mode are mutually exclusive; you must enable one or the other on
the root system:
•
When modeling an L2V root, ensure that the ScreenOS version is set to 5.0L2V and
the operating mode is set to Transparent. By default, the root system is modeled as a
neutral vsys, enabling you to configure the system in either L2V or VLAN Trunk mode.
•
When importing an L2V root:
•
If the device is in transparent mode with L2V enabled, NSM imports those settings
and creates the device in L2V mode.
•
If the device is in transparent mode with L2V disabled, NSM creates the device in
neutral vsys mode. You can use the NSM UI to configure the device in VLAN or L2V
mode.
•
If the device is in transparent mode with VLAN trunk enabled, NSM imports those
settings and creates the device in VLAN mode. In this mode, you can add vsys devices
to the root system, but you cannot import VLAN IDs to those vsys devices.
NOTE:
As of Release 2007.3, NSM supports L2V on ISG1000 devices
running ScreenOS 6.0 and later. L2V is still supported on ISG2000 and
later.
For details on configuring these vsys modes, see
Network and Security Manager Configuring
ScreenOS and IDP Devices Guide
.
Adding an Extranet Device
An extranet device is a firewall or VPN device that is not a Juniper Networks security
device. If you use devices from multiple manufacturers, you can add extranet devices to
NSM to represent your heterogeneous network environment. After you have added the
extranet device to the NSM UI, you can use the device in groups, security policies, and
VPNs.
To add a new extranet device in Device Manager, click the Add icon and select
Extranet
Device
. The Extranet Device dialog box appears. Enter the extranet device information:
•
Name—Enter the name of the extranet device. The name can contain letters, numbers,
spaces, dashes, and underscores.
•
Color—Select the color that represents the extranet device in the NSM UI.
•
IP Address—Enter the IP Address of the extranet device
Click
OK
to add the extranet device to NSM.
Adding Clusters
A cluster consists of multiple devices joined together in a high availability configuration
to ensure continued network uptime. The device configurations are synchronized, meaning
151
Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Adding Devices
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...