Configuring Client Lists (Nsm Procedure) - Juniper NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3 Configuration Manual

Nsm configuration guide for ex series devices
Table of Contents

Advertisement

Related
Documentation

Configuring Client Lists (NSM Procedure)

118
Cancel—Cancels the modifications.
Table 71: Basic System Identification Details
Option
Function
System Name
Specifies a system name for the
device.
Description
Provides a description for the
system.
Location
Specifies the system location
information.
Contact
Specifies the contact information
for the system.
Snmp > Engine Id
Use Mac Address
Sets the engine ID to use the MAC
address.
Configuring SNMP Communities (NSM Procedure) on page 140
Configuring SNMP Trap Groups (NSM Procedure) on page 144
Configuring SNMP Views (NSM Procedure) on page 139
You can configure a group of SNMP clients as a client list by providing either the IPv4 or
IPv6 addresses for the individual clients that you want to assign to this client list. You
can then specify that the members of the list be authorized to use a particular SNMP
community. See "Configuring SNMP Communities (NSM Procedure)" on page 140 for
information about adding a client to a community. If a community is not configured with
such specific client addresses in client lists as authorized, then all SNMP clients using
this community string are authorized by default to access the device.
To configure client lists in NSM:
In the navigation tree, select Device Manager > Devices.
1.
In the Devices list, double-click the device to select it.
2.
Click the Configuration tab.
3.
In the configuration tree, expand SNMP.
4.
Select Client List.
5.
Click the Add or Edit icon.
6.
Your Action
Enter the system name as a free-form
text string.
Enter a description for the system. For
example, type J4350 with 4 PIMs.
Enter the system location information
(such as a lab name and a rack name).
Enter the system contact information
(such as a name and a phone number).
Select this option.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents