Table 23: Csv File Information For Devices With Static Ip Addresses; Device With Dynamic Ip Addresses - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide
170

Table 23: CSV File Information for Devices with Static IP Addresses

Field Name
Type
Name
String
Color
String
Device IP Address
String
Device Admin Name
String
Device Admin Password
String
Connection Protocol
String
Device Admin Port
Integer
SSH Fingerprint
String
Example: Using an Excel File to Add Multiple Static IP Devices
To edit the template for adding many devices with static IPs:
Copy and open the Microsoft Excel file
1.
bulkadd_ipreachable-DMIDMI-sample.csv
Security Manager/utils
Using one row for each device you want to add, enter the required values for the
2.
device. You can also provide optional values, if desired.
Save the file to a location on your local drive.
3.
Example: Using a Text File to Add Multiple Static IP Devices
To add four security devices that use static IP addresses, create a text file with the
following text:
Chicago,green,10.100.31.78,netscreen,netscreen,ssh_v2,,any
Memphis,orange,10.100.20.236,netscreen,netscreen,ssh_v2,,any
Columbus,red,10.100.20.200,netscreen,netscreen,ssh_v2,,any
Cincinnati,blue,10.100.20.2367,netscreen,netscreen,ssh_v2,,any
Save the file as a .csv file.

Device with Dynamic IP Addresses

For devices with dynamic IP addresses, create a
Table 24 on page 171.
Required
Acceptable Values
yes
yes
black, gray, blue, red, green, yellow,
cyan, magenta, orange, pink
yes
192.168.1.1, 10.1.1.10, 3.3.3.3
yes
<administrator>
yes
<password>
Note: All passwords handled by NSM
are case-sensitive.
yes
telnet, ssh_v1, ssh_v2.
no
23, 22, 4444, 7777
If null, uses 23 for Telnet and 22 for SSH
yes (when
<SSH fingerprint>
connection
Use any to bypass check.
SSH)
bulkadd_ipreachable-sample.csv
from the
directory.
file with the parameters shown in
.csv
or
C:/Program Files/Network and
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents