Device Image Updates; Auditing; Complete System Management; Vpn Abstraction - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Complete System Management

8

Device Image Updates

You can update the software that runs on your devices by installing a new image on your
managed devices:
NSM updates—For ScreenOS and JUNOS families of devices, you can use NSM to
upload the new image file to multiple devices with a single click.
RMA updates—To replace failed devices, set the device to the RMA state, which enables
NSM to retain the device configuration without a serial number or connection statistics.
When you install the replacement device, activate the device with the serial number
of the replacement unit.

Auditing

Use the Audit Log Viewer to track administrative actions so you'll always know exactly
when and what changes were made using the management system. The Audit Log Viewer
displays log entries in the order generated, and includes:
Date and time the administrative action occurred
NSM administrator who performed the action
Action performed
Domain (global or a subdomain) in which the action occurred
Object type and name
NSM provides the tools and features you need to manage your devices as a complete
system, as well as individual networks and devices:
To manage an individual device, create a single device configuration, define a security
policy for that device, and monitor the device status
To manage a network, create multiple device configurations, define and install policies
for multiple devices, and view the status of all devices in the same UI.
To manage at the system level, create templates and use them to quickly configure
multiple policies and VPNs that control the flow of traffic through your network, view
system-wide log information for network security events, and monitor the status of
NSRP.

VPN Abstraction

Use VPN Manager to design a system-level VPN and automatically set up all connections,
tunnels, and rules for all devices in the VPN. Instead of configuring each device as a VPN
member and then creating the VPN, start from a system perspective: Determine which
users and networks need access to each other, and then add those components to the
VPN.
Using AutoKey IKE, you can create the following VPNs with VPN Manager:
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents