CHAPTER 3
Adding Secure Access Devices
This chapter provides information on how to add a Secure Access device through the
import workflow and also how to verify the imported configuration. This chapter contains
the following procedures:
•
Importing a Secure Access Device on page 11
•
Requirements for Importing a Secure Access Device into NSM Through a Reachable
Workflow on page 14
•
Adding a Secure Access Device Through a Reachable Workflow on page 15
•
Importing Multiple Secure Access Devices on page 16
•
Verifying Imported Device Configurations on page 19
Importing a Secure Access Device
You can add a Secure Access device to your existing network by using NSM and importing
its configurations. Using the Add Device Wizard, you can configure a connection between
the management system and the physical device, and then import all device parameters,
policies, objects, VPNs, and so on.
Import a Secure Access device by following these procedures:
1.
Installing and Configuring a Secure Access Device on page 11
2.
Adding a Secure Access Device Through NSM on page 12
3.
Configuring and Activating the NSM agent on the Secure Access Device on page 13
4.
Confirming Connectivity and Importing the Secure Access Device
Configuration on page 14
Installing and Configuring a Secure Access Device
Before you add the Secure Access device to NSM, you must install and configure the
Secure Access device to have logon credentials for an NSM administrator.
11
Copyright © 2010, Juniper Networks, Inc.
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...