Secure Access devices configured in a cluster must have a cluster object and member
objects defined in the NSM before the Secure Access cluster nodes can be recognized
by NSM. Nodes from this cluster that subsequently contact NSM will be represented by
fully functional member icons in the Cluster Manager. Cluster members whose DMI agents
do not contact NSM will be displayed in the NSM Device Monitor as unconnected devices.
Secure Access devices use member IDs to identify each cluster member object. When
importing cluster members, the member ID is imported as part of the cluster.
To add a Secure Access cluster to NSM, first add the cluster object, and then add its
members. You add cluster members one at a time, in a similar manner to adding
standalone devices.
NOTE:
Adding a cluster and adding a cluster member have no effect on the
cluster itself. The cluster and cluster members must already exist.
Once a Secure Access cluster is managed by NSM, subsequent changes applied to the
cluster by NSM will be synchronized by the cluster across all cluster members. Similarly,
changes to a Secure Access cluster membership that occur through administrator action
on the native device UI will be reflected back to NSM, and NSM will display the modified
cluster.
You can add a Secure Access cluster from your existing network into NSM and import
their configurations. Using the Add Device Wizard, you configure a connection between
the management system and the physical device, and then import all device parameters.
Related
Documentation
Adding a Secure Access Cluster with Imported Cluster Members on page 24
•
•
Creating and Applying a Secure Access Device Template on page 29
•
Promoting a Secure Access Device Configuration to a Template on page 31
Adding a Secure Access Cluster with Imported Cluster Members
Add and import a Secure Access cluster in NSM by following these procedures:
1.
Installing and Configuring the Cluster on page 25
2.
Adding the Cluster in NSM on page 25
3.
Adding the Cluster Members in NSM on page 25
4.
Configuring and Activating the DMI Agent on the Cluster on page 27
5.
Importing Cluster Configuration on page 27
Copyright © 2010, Juniper Networks, Inc.
24
Configuring Secure Access Devices Guide
Содержание NETWORK AND SECURITY MANAGER
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Страница 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Страница 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Страница 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Страница 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Страница 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Страница 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Страница 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Страница 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Страница 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Страница 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Страница 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Страница 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Страница 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Страница 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Страница 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Страница 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Страница 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Страница 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...