Understanding Secure Access Device Configuration; Chapter 1 Understanding Secure Access Device Configuration; Nsm And Secure Access Device Management Overview; Communication Between A Secure Access Device And Nsm Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 1
Understanding Secure Access Device
Configuration

NSM and Secure Access Device Management Overview

Related
Documentation

Communication Between a Secure Access Device and NSM Overview

Copyright © 2010, Juniper Networks, Inc.
NSM and Secure Access Device Management Overview on page 3
Communication Between a Secure Access Device and NSM Overview on page 3
Secure Access Device Services and Device Configurations Supported in NSM on page 5
NSM is the Juniper Networks network management tool that allows distributed
administration of network appliances. You can use the NSM application to centralize
status monitoring, logging, and reporting, and to administer Secure Access device
configurations.
With NSM, you can manage most of the parameters that you can configure through the
Secure Access admin console. The configuration screens rendered through NSM are
similar to the screens in the Secure Access device admin console. NSM incorporates a
broad configuration management framework that allows co-management using other
methods.
Communication Between a Secure Access Device and NSM Overview on page 3
Secure Access Device Services and Device Configurations Supported in NSM on page 5
Importing a Secure Access Device on page 11
The Secure Access device and the NSM application communicate through the Device
Management Interface (DMI). DMI is a collection of schema-driven protocols that run
on a common transport (that is, TCP). DMI is designed to work with Juniper Networks
platforms to make device management consistent across all administrative realms.
Supported DMI protocols include:
3

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager

Table of Contents