Running A Device Discovery Rule; Adding Many Devices Using Csv Files - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Running a Device Discovery Rule

Adding Many Devices Using CSV Files

Copyright © 2010, Juniper Networks, Inc.
Administrator login name and password.
SNMP version and community string.
Select the Run Topology Discovery checkbox, if you want to use topology discovery
to discover devices.
Click Apply to add the rules to the list of device discovery rules.
4.
To ensure that devices are discovered correctly, it is recommended that you:
Use SNMP V1 or V2C versions.
Use a subnet mask narrower than 255.255.240.0 because the broadest subnet mask
recommended for any device discovery rule is 255.255.240.0.
Do not use more than 4096 IP addresses.
NOTE: Device discovery supports only IPv4 addresses. IPv6 based devices
are not discovered.
NOTE: Device discovery will not add cluster members. Cluster members will
have to be added to NSM manually.
To run a device discovery rule:
In the Configure pane of the NSM navigation tree, click Device Discovery Rules.
1.
Select the rule you want to run.
2.
Click the Run icon in the discovery rules toolbar.
3.
The device discovery Progress dialog box appears.
NSM pings each IP address in the specified range to see which ones it can reach, and
then runs the rule against each reachable device. When it finds a device that satisfies
the rule, it displays a dialog box containing an SSH key for you to verify.
Accept the SSH key. The device automatically connects with NSM and NSM imports
4.
the device configuration.
The Device Discovery Progress box shows which devices were added, devices that
were found but could not be added, and at what stage in the discovery process the
device add process failed.
If your network includes a large number of devices, you can save time by adding multiple
devices in a single workflow using the Add Many Device wizard.
Chapter 4: Adding Devices
169

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents