% commit
The device software initiates the TCP connection to NSM and identifies itself using
the specified device ID and HMAC. The two sides then engage in SSH transport
layer interactions to set up an encrypted tunnel, and NSM authenticates itself to
the device based on user name and password.
d.
In the Device List, verify the connection status of the cluster member. The status
changes from “Never connected” to “Up.”
•
If the configuration status is “platform mismatch,” you selected the wrong device
platform when adding the device into NSM. Delete the device from NSM and
add it again using the correct device platform.
•
If the configuration status shows “device firmware mismatch,” you selected the
wrong managed OS version when adding the device into NSM. Delete the device
from NSM and add it again using the correct managed OS version.
e.
Check the device configuration status by holding your mouse cursor over the device
in Device Manager, or by checking the configuration status in Device Monitor. When
the device connects, the status displays “Update Needed”, indicating that the
device has connected but the management system has not yet pushed the device
configuration.
5.
Repeat Step 4 for the second cluster member J-2.
Updating the Cluster
After you have modeled the cluster configuration, you can push the new configuration
to the physical cluster using the Update Device directive.
1.
In the NSM navigation tree, select
Device Manager > Devices.
2.
Right-click
J-Cluster
(the cluster icon) and select
Update Device
from the list.
NSM starts a job that pushes the modeled configuration to the device. A job window
reports the progress. On completion, the configuration status changes from “Update
Needed” to “Managed”.
Adding a Vsys Cluster and Vsys Cluster Members
A vsys cluster is a vsys device that has a cluster as its root device. Adding a vsys cluster
is a three-stage process:
1.
Add a vsys device that uses the cluster device as root. For details on adding a vsys
device, see “Adding Vsys Devices” on page 147.
2.
Add cluster members to the cluster device, using the instructions in the wizard to
import or add a new cluster member. A vsys cluster can have only two members.
3.
Add a cluster device object. For details on adding a cluster, see “Adding Clusters” on
page 151. (You add members later.)
The UI also creates a vsys cluster member for each vsys device that uses the cluster
as its root device. The vsys cluster member contains local information; the cluster
165
Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Adding Devices
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...