Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 129

Table of Contents

Advertisement

Table 16: Predefined NSM Administrator Activities (continued)
Function
Device Configuration
Device CPU Limit
Device Delta Config
Device Firmware
Device Log Comments
Device Log Flags
Device Logs
Device Passwords
Device Reboot
Device Running Config
Device Site Survey
Device Software Keys
Device Status Monitor
Copyright © 2010, Juniper Networks, Inc.
Task
Description
View
A device configuration is the modeled configuration that exists for a
managed device within NSM.
Update
N/A
View
A device delta config is a report that lists the differences between the
device configuration running on the physical device and the modeled
device configuration in NSM.
Update
The device firmware is the software image used on the managed device.
Update
A device log comment is a user-defined description of a security event
that is recorded in a device log.
Update
A device log flag is a visual icon that can be assigned to a device log.
Administrators can assign flags to indicate severity, status, and other
options to a device log.
View
A device log records a security event that occurred on a security device.
Hide and Unhide
Purge
Archive
Retrieve
View
This activity enables an administrator to view device passwords in
configuration summaries and Job Manager information details.
Note: All passwords handled by NSM are case-sensitive.
Reboot
A device reboot is a reboot command sent to a managed device to power
down, and then power up.
View
A device running config is a report that details the device configuration
running on the physical device.
N/A
When setting up the NetScreen-5GT Wireless (ADSL) device as a wireless
access point (WAP), this activity enables an administrator to scan the
broadcast vicinity to see if there are any other WAPs broadcasting nearby.
Install
A device software key provides, enhances, or adds functionality for a
managed device.
View
The device status monitor tracks the status of devices, VPN tunnels, and
NSRP.
Chapter 3: Configuring Role-Based Administration
79

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents