Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?
Questions and answers
Related Manuals for Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01
Page 2
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Page 3
REGARDING LICENSE TERMS. 1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or Juniper Networks (Cayman) Limited (if the Customer’s principal office is located outside the Americas) (such applicable entity being referred to herein as “Juniper”), and (ii) the person or organization that originally purchased from Juniper or an authorized Juniper reseller the applicable...
Page 5
(including Juniper modifications, as appropriate) available upon request for a period of up to three years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N. Mathilda Ave., Sunnyvale, CA http://www.gnu.org/licenses/gpl.html...
Objectives Network and Security Manager (NSM) is a software application that centralizes control and management of your Juniper Networks devices. With NSM, Juniper Networks delivers integrated, policy-based security and network management for all security devices. Secure Access (SA) device is the next generation Secure Access SSL VPN appliances in its leading market.
7 days a week, 365 days a year. Self-Help Online Tools and Resources For quick and easy problem resolution, Juniper Networks has designed an online self-service portal called the Customer Support Center (CSC) that provides you with the following features: Find CSC offerings: http://www.juniper.net/customers/support/...
The Secure Access device and the NSM application communicate through the Device Management Interface (DMI). DMI is a collection of schema-driven protocols that run on a common transport (that is, TCP). DMI is designed to work with Juniper Networks platforms to make device management consistent across all administrative realms.
Page 22
To allow NSM to manage the Secure Access device using the DMI protocol, NSM must import the schema and metadata files from the Juniper Networks Schema Repository, a publicly accessible resource that is updated with each device release. In addition to downloading the Secure Access device current schema, NSM may also download upgraded software.
NSM Installation Overview NSM is a software application that enables you to integrate and centralize management of your Juniper Networks environment. You need to install two main software components to run NSM: the NSM management system and the NSM user interface (UI).
Juniper Networks provides CSV templates in Microsoft Excel format for each type of CSV file. These templates are located in the utils subdirectory where you have stored the program files for the UI client.
To reuse an existing expression, select the expression and click the Insert Expression button. NOTE: Refer to the Juniper Networks Secure Access Administration Guide for more information on variables and writing custom expressions. Enter a name for the custom expression.
Host Checker policy requirements. NOTE: This option applies to predefined rules, custom rules, and to third-party IMVs that use extensions in the Juniper Networks TNC SDK. Related Configuring Host Checker Third-Party Applications Using Predefined Rules (NSM...
Host Checker policy. You can automatically import either the current Virus signature version monitoring or Patch Management Info Monitoring list from the Juniper Networks staging site at a specified interval. Alternatively, you can download the files from Juniper Networks and use your own staging server.
Click either Virus signature version monitoring or Patch Management Info Monitoring. Download the list from the Juniper Networks staging site to a network server or local drive on your computer by entering the Juniper Networks URLs in a browser window.
Select the check box to enable this feature. IP Address Enter the IP address of your proxy server. Port Enter the port that the Juniper Networks Support site will use to communicate with your proxy server. Related Configuring Virus Signature Version Monitoring (NSM Procedure) on page 248...
Juniper IDP variable to display its description and example usage. Click the Juniper IDP variable example displayed to insert it in the Expression area. NOTE: Refer to the Juniper Networks Secure Access Administration Guide for more information on variables and writing custom expressions.
This chapter describes the interoperation between heterogeneous network appliances in a federated network. In a federated network, users providing valid credentials can access resources protected by any number of Juniper Networks security devices without re-authenticating through a different device. Juniper Networks IDP Series Intrusion Detection and Prevention Appliance can be incorporated into a federated network to protect against attacks within the network.
Configuring Secure Access Devices Guide Configuring Client-Side Logs (NSM Procedure) Client-side logging is useful when working with the Juniper Networks Support team to debug problems with an Secure Access device client-side feature. When you enable logging for a feature, the Secure Access device writes a log to any client computer that uses the feature.
Network Management Protocol) v2, implements a private MIB (management information base), and defines its own traps. To enable your network management station to process these traps, you need to download the Juniper Networks MIB file and specify the appropriate information to receive the traps.
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?
Questions and answers