Once the Secure Access device and NSM are communicating, the Secure Access device
delivers syslog and event information to NSM.
After NSM and the Secure Access device are connected, you can make any configuration
changes directly on the Secure Access device, bypassing NSM. NSM automatically detects
these changes and imports the new configuration data. Changes to Secure Access cluster
members will similarly be detected by NSM.
When you make changes to the Secure Access device configuration through NSM you
must push the changes to the device by performing an Update Device operation.
When you double-click the Secure Access device icon in the Device Manager and select
the Configuration tab, the configuration tree appears in the main display area in the same
orientation as items appear on the Secure Access device admin console.
Related
Documentation
Secure Access Device Services and Device Configurations Supported in NSM on page 5
•
•
Importing a Secure Access Device on page 11
•
NSM and Secure Access Device Management Overview on page 3
Secure Access Device Services and Device Configurations Supported in NSM
The Secure Access device supports the following services in NSM:
•
Inventory management service — Enables management of the Secure Access software,
hardware, and licensing details. Adding or deleting licenses or upgrading or downgrading
software are not supported.
•
Status monitoring service — Allows the Secure Access device’s status to be obtained,
including name, domain, OS version, synchronization status, connection details, and
current alarms.
•
Logging service — Allows the Secure Access device’s logs to be obtained in a
time-generated order. Logging configuration details that are set on the Secure Access
device will apply to NSM.
•
XML-based configuration management service — Enables NSM to manage the
configuration of the Secure Access device. NSM uses the same XML schema as the
Secure Access device, so you can troubleshoot NSM using XML files downloaded from
the Secure Access device.
The following device configurations are not supported:
•
Editing licensing information, although licenses can be viewed
•
Creating clusters, joining nodes to clusters, or enabling or disabling cluster nodes
•
Packaging log files or debug files for remote analysis
•
Rebooting the Secure Access device
Related
Documentation
•
Communication Between a Secure Access Device and NSM Overview on page 3
5
Copyright © 2010, Juniper Networks, Inc.
Chapter 1: Understanding Secure Access Device Configuration
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...