new network to work with your existing network. NSM provides a virtual environment in
which to first model, verify, and then update your managed devices with changes.
Importing Devices
If you have existing devices deployed you can use the NSM import feature to import their
configurations, address books, service objects, policies, VPNs, and administrator privileges.
As NSM imports your existing device configurations, it automatically creates your virtual
network based on the configuration information.
You can import device configurations directly from your devices. Import all your devices
at one time, or, if your network is large, import one domain at a time.
Device Modeling
Using your virtual network to change, review, and test your network configuration before
deploying it to your physical network can help you discover problems like routing issues,
IP conflicts, and version mismatches across your entire network before they actually
occur. NSM includes configuration validation to help you identify device configuration
errors and missing information, and then points you to the trouble spot so you can quickly
fix the problem. When you have designed a virtual configuration that works, you can push
this configuration to your devices with a single update.
You can implement a new routing protocol across your network, design and deploy a
new security policy with traffic shaping, or create a new VPN tunnel that connects a
branch office to your corporate network.
Rapid Deployment
Rapid Deployment (RD) enables deployment of multiple ScreenOS security devices in
a large network environment with minimal user involvement. RD simplifies the staging
and configuration of security devices in nontechnical environments, enabling the secure
and efficient deployment of a large number of devices.
To use RD, the NSM administrator creates a small file (called a configlet) in NSM, and
then sends that configlet to an on site administrator who has local access to the security
device. With the help of the Rapid Deployment wizard, the onsite administrator installs
the configlet on the device, which automatically contacts NSM and establishes a secure
connection for device management.
RD is ideal for quickly bringing new security devices under NSM management for initial
configuration. You can model and verify your device configurations for undeployed devices,
and then install the completed device configuration when the device contacts NSM.
Policy-Based Management
Create simplified and efficient security policies for your managed devices. You can manage
security policies either in a Central Policy Manager or through in-device policy
management, depending on the type of device. The tools at your disposal are also
device-dependent, but can include:
Copyright © 2010, Juniper Networks, Inc.
6
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...