5.
Create security policies.
NSM integrates policy management, linking multiple devices to one security policy
that defines the type of traffic permitted on the network and how that traffic is treated
inside the network.
NOTE:
You can use the NSM Policy Manager to centralize policy
management for certain devices. Devices that support central policy
management include ScreenOS and IDP devices and any J Series routers
or SRX Series gateways configured for central policy management.
•
Add a policy, and then create firewall rules that specify source, destination, service,
and action. You can also create multicast rules to handle multicast control traffic.
•
Verify each policy using the Policy Validation tool.
For details of configuring policies, see “Configuring Security Policies” on page 435.
6.
Update devices after they are deployed. This action pushes the modeled configuration
to the deployed device.
•
Resolve any validation issues with the device configuration.
•
View a summary of the device configuration to ensure that all device parameters
are correct.
•
Check progress in Job Manager.
For details about pushing a configuration to a device, see “Updating Devices” on
page 243.
7.
Create VPN rules.
•
Create Protected Resources.
•
Create user objects and User Groups for RAS VPNs.
•
Use VPN Manager to select VPN members, and then automatically generate the
rules for each member.
For details about configuring VPNs, see “Configuring VPNs” on page 551
For details on adding devices, see “Adding Devices” on page 97. For details on configuring
devices, see “Configuring Devices” on page 187.
Editing a Device Configuration
After importing or modeling a device configuration in NSM, you can edit that configuration
in NSM. For configuration changes to become effective, however, you must update the
device by pushing the edited configuration to it. For details about pushing a configuration
to a device, see “Updating Devices” on page 243.
Conversely, the device configuration can be edited by the device administrator using the
device's native GUI or CLI. To synchronize the device object configuration in NSM with
the actual device, you must then reimport the device.
Copyright © 2010, Juniper Networks, Inc.
44
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...