Activating A Device; Devices With Static Ip Addresses - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Activating a Device

132
NOTE: When modeling a NetScreen-500, 5000 series, or ISG series security device,
you must configure the network module (slot) before physical interfaces appear in the
NSM UI. For details on defining the Ethernet card and slot, see Network and Security
Manager Configuring ScreenOS and IDP Devices Guide.
Double-click the device object to display the device configuration and begin configuring
the device as desired. For details on device configuration, see "Configuring Devices" on
page 185.
After you have created a device configuration for the undeployed device, you are ready
to activate the device and prompt it to connect to the management system. After that
device has made contact with NSM, you can install the configuration you created on the
device.

Devices with Static IP Addresses

A static IP address is an IP address that does not change.
ScreenOS Devices
To activate a ScreenOS 5.0 or later device with a static IP address:
Check the device configuration state by holding your mouse cursor over the device
1.
in Device Manager, or by checking the configuration status in Device Monitor. The
device configuration state should display "Modeled", indicating that the management
system is waiting for the device to connect.
Right-click the device and select Activate Device to display the Activate Device
2.
wizard.
Select Device Deployed and IP is reachable.
3.
Click Next and enter the connection information:
4.
Enter the IP Address of the security device.
Enter the device administrator name and password.
NOTE: All passwords handled by NSM are case-sensitive.
Select the connection method (Telnet, SSH version 1, SSH version 2) and the port
number for the selected service.
If you selected Telnet, click Next and go to Step 5.
If you selected an SSH version, click Next. The Verify Device Authenticity dialog
box opens. The device wizard displays the RSA Key FingerPrint information. To
prevent man-in-the-middle attacks, you should verify the fingerprint using an
out-of-band method.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents