With the wizard, you can add up to 4000 devices at a time to a single domain (you cannot
add multiple devices to different domains at one time). Additionally, for some types of
ScreenOS devices, you can create configlets to activate rapidly your newly deployed
security devices. However, you cannot configure Rapid Deployment for Secure Access
devices, Infranet Controller devices, or devices running Junos OS. Neither can you configure
RD when adding multiple ScreenOS security devices that are systems (NetScreen-500,
NetScreen-5000, ISG1000, ISG2000).
NOTE:
You cannot use the Add Many Devices wizard to add clusters or cluster
members, EX Series Ethernet Switches configured as a virtual chassis or an
SRX virtual chassis.
Adding many devices is a three-step process:
1.
Create the CSV file.
This file defines all the required and optional values for each device.
2.
Use the Add Many Devices wizard to select the CSV file to import or model the devices.
The wizard validates the CSV file, notifies you of any errors, and then adds the devices
for which all defined values are valid.
•
When importing devices with static IP addresses, the device configuration is
automatically imported during the Add Many Devices workflow.
•
When importing devices with dynamic IP addresses, you must manually import the
device configuration after the Add Many Devices workflow is complete.
•
When modeling ScreenOS devices for Rapid Deployment, you can also create
configlets during the Add Many Devices workflow, or select to skip configlet creation.
The time it takes for NSM to activate and import devices depends on the number of
devices and the management system configuration.
3.
Verify the device configuration.
4.
Select the
Use Host Name if Available
checkbox, to detect the host name configured
on the device and use it as the device name.
5.
Select the
Run Topology Discovery
checkbox to trigger a topology discovery.
The following sections provide details about each step.
Creating the CSV File
Within a
.csv
file, you define the device configuration values for each device you want to
add. The required and optional values depend not only on how the device is deployed
on your network—static IP addresses, dynamic IP addresses, or undeployed devices—but
also on the device family.
You must create a separate CSV file for the following devices:
Copyright © 2010, Juniper Networks, Inc.
170
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...