Detect And Resolve Configuration Conflicts; Clone A Port Template - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Detect and Resolve Configuration Conflicts

Clone a Port Template

622
The Detect/Resolve Configuration Conflicts screen displays all the devices that are
associated with the selected port template. To detect and resolve conflicts:
Select the devices from the list.
1.
To resolve conflicts, select
2.
Click
. The port configuration conflicts are detected or resolved and the results
OK
3.
are displayed.
Click
OK
to confirm.
4.
The
Launch Update Device
5.
update the device configuration immediately, select
.
OK
To customize a port template's CoS parameters:
Select the predefined port template from the list and click the
1.
button and choose
Template
Template screen is displayed.
NOTE: As an administrator, you can create port templates using the Customize Port
Template feature.
To modify the default template name, type a name in the
2.
To modify the default description, type a description in the
3.
To modify the default scheduler map name, type a name in the
4.
field.
To edit scheduler settings, click
5.
Specify the following:
Scheduler name
Transmit Rate—Select one:
parameter,
Percent
bandwidth available.
Buffer Size—Transmit Rate—Select one:
configure the parameter,
remaining buffer available.
Priority—Select a value from the list.
Click
to save the settings or
OK
Click
Save
to create the customized port template.
6.
Remove Conflicts in Configuration
screen is displayed with a list of modified devices. To
Clone to new Port Template
. The Edit Scheduler screen is displayed.
Edit Scheduler
if you do not want to configure the
Unconfigured
and enter a value, or
Remainder
Unconfigured
and enter a value, or
Percent
to cancel all modifications.
Cancel
.
Update Device now
and click
Customize Port
. The Customize Port
Template Name
field.
field.
Description
Scheduler Map
to assign the remaining
if you do not want to
to assign the
Remainder
Copyright © 2010, Juniper Networks, Inc.
Name

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents