Detect And Resolve Configuration Conflicts; Clone A Port Template - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Detect and Resolve Configuration Conflicts

Clone a Port Template

648
The Detect/Resolve Configuration Conflicts screen displays all the devices that are
associated with the selected port template. To detect and resolve conflicts:
Select the devices from the list.
1.
To resolve conflicts, select
2.
Click
. The port configuration conflicts are detected or resolved and the results are
OK
3.
displayed.
Click
OK
to confirm.
4.
The
Launch Update Device
5.
the device configuration immediately, select
To customize a port template's CoS parameters:
Select the predefined port template from the list and click the
1.
button and choose
Clone to new Port Template
is displayed.
NOTE: As an administrator, you can create port templates using the
Customize Port Template feature.
To modify the default template name, type a name in the
2.
To modify the default description, type a description in the
3.
To modify the default scheduler map name, type a name in the
4.
field.
To edit scheduler settings, click
5.
Specify the following:
Scheduler name
Transmit Rate—Select one:
parameter,
and enter a value, or
Percent
bandwidth available.
Buffer Size—Transmit Rate—Select one:
the parameter,
Percent
buffer available.
Priority—Select a value from the list.
Click
to save the settings or
OK
Click
to create the customized port template.
Save
6.
Remove Conflicts in Configuration
screen is displayed with a list of modified devices. To update
Update Device now
. The Customize Port Template screen
. The Edit Scheduler screen is displayed.
Edit Scheduler
Unconfigured
if you do not want to configure the
Remainder
Unconfigured
and enter a value, or
Remainder
to cancel all modifications.
Cancel
Copyright © 2010, Juniper Networks, Inc.
.
and click
OK
.
Customize Port Template
Template Name
field.
field.
Description
Name
Scheduler Map
to assign the remaining
if you do not want to configure
to assign the remaining

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents