To install and configure a Secure Access device:
1.
Select
System > Network > Overview
in the device’s admin console and ensure that
basic connection information such as the following are configured on the Secure
Access device:
•
Network interface settings
•
DNS settings
•
Password
2.
Select
Authentication > Auth Servers
and enter the username and password of the
NSM administrator in the applicable authentication server.
NOTE:
Only password-based authentication servers can be used. One-time
password authentication is not supported.
3.
Select
Administrators > Admin Roles
and create an NSM agent role.
4.
Select
Administrators > Admin Realms
and create an NSM agent administrator realm
for the DMI agent on the Secure Access device and use role mapping to associate the
NSM agent role and realm. Do not apply any role or realm restrictions for the NSM
agent role or realm.
For complete details on installing and configuring Secure Access devices, see the
Juniper
Networks Secure Access Administration Guide.
Adding a Secure Access Device Through NSM
To add the Secure Access device through the NSM UI:
1.
From the left pane of the NSM UI, click
Configure.
2.
Expand
Device Manager
and Select
Devices
. The Devices workspace appears on the
right side of the screen.
3.
Click the
Device Tree
tab, click the
New
button, and select
Device
. The New-Device
dialog box appears.
4.
Select
Device is Not Reachable
and click
Next
.
5.
Enter the device name, and select the required color, OS name (SA), and platform
and managed OS version from the drop-down lists.
6.
From the Choose Device Server Connection Parameter area, select:
•
Use Default Device Server IP Address and Port
— Connects the device to the NSM
Device Server IP address and port.
•
Use Device Server Through MIP
— Connects the NSM device server through a
mapped IP address and port.
7.
Click
Next
, and a unique external ID gets generated automatically. This ID represents
the device within the management system.
Copyright © 2010, Juniper Networks, Inc.
12
Configuring Secure Access Devices Guide
Summary of Contents for NETWORK AND SECURITY MANAGER
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 12: ...Copyright 2010 Juniper Networks Inc xii Configuring Secure Access Devices Guide...
Page 18: ...Copyright 2010 Juniper Networks Inc xviii Configuring Secure Access Devices Guide...
Page 20: ...Copyright 2010 Juniper Networks Inc 2 Configuring Secure Access Devices Guide...
Page 28: ...Copyright 2010 Juniper Networks Inc 10 Configuring Secure Access Devices Guide...
Page 40: ...Copyright 2010 Juniper Networks Inc 22 Configuring Secure Access Devices Guide...
Page 46: ...Copyright 2010 Juniper Networks Inc 28 Configuring Secure Access Devices Guide...
Page 50: ...Copyright 2010 Juniper Networks Inc 32 Configuring Secure Access Devices Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 34 Configuring Secure Access Devices Guide...
Page 82: ...Copyright 2010 Juniper Networks Inc 64 Configuring Secure Access Devices Guide...
Page 110: ...Copyright 2010 Juniper Networks Inc 92 Configuring Secure Access Devices Guide...
Page 154: ...Copyright 2010 Juniper Networks Inc 136 Configuring Secure Access Devices Guide...
Page 224: ...Copyright 2010 Juniper Networks Inc 206 Configuring Secure Access Devices Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 216 Configuring Secure Access Devices Guide...
Page 288: ...Copyright 2010 Juniper Networks Inc 270 Configuring Secure Access Devices Guide...
Page 300: ...Copyright 2010 Juniper Networks Inc 282 Configuring Secure Access Devices Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 292 Configuring Secure Access Devices Guide...
Page 312: ...Copyright 2010 Juniper Networks Inc 294 Configuring Secure Access Devices Guide...
Page 320: ...Copyright 2010 Juniper Networks Inc 302 Configuring Secure Access Devices Guide...
Page 322: ...Copyright 2010 Juniper Networks Inc 304 Configuring Secure Access Devices Guide...
Page 337: ...PART 6 Index Index on page 321 319 Copyright 2010 Juniper Networks Inc...
Page 338: ...Copyright 2010 Juniper Networks Inc 320 Configuring Secure Access Devices Guide...
Page 340: ...Copyright 2010 Juniper Networks Inc 322 Configuring Secure Access Devices Guide...