Related
Documentation
Secure Access Device Services and Device Configurations Supported in NSM
Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Once the Secure Access device and NSM are communicating, the Secure Access device
delivers syslog and event information to NSM.
After NSM and the Secure Access device are connected, you can make any configuration
changes directly on the Secure Access device, bypassing NSM. NSM automatically detects
these changes and imports the new configuration data. Changes to Secure Access cluster
members will similarly be detected by NSM.
When you make changes to the Secure Access device configuration through NSM you
must push the changes to the device by performing an Update Device operation.
When you double-click the Secure Access device icon in the Device Manager and select
the Configuration tab, the configuration tree appears in the main display area in the same
orientation as items appear on the Secure Access device admin console.
Secure Access Device Services and Device Configurations Supported in NSM on page 5
Importing a Secure Access Device on page 11
NSM and Secure Access Device Management Overview on page 3
The Secure Access device supports the following services in NSM:
Inventory management service — Enables management of the Secure Access software,
hardware, and licensing details. Adding or deleting licenses or upgrading or downgrading
software are not supported.
Status monitoring service — Allows the Secure Access device's status to be obtained,
including name, domain, OS version, synchronization status, connection details, and
current alarms.
Logging service — Allows the Secure Access device's logs to be obtained in a
time-generated order. Logging configuration details that are set on the Secure Access
device will apply to NSM.
XML-based configuration management service — Enables NSM to manage the
configuration of the Secure Access device. NSM uses the same XML schema as the
Secure Access device, so you can troubleshoot NSM using XML files downloaded from
the Secure Access device.
The following device configurations are not supported:
Editing licensing information, although licenses can be viewed
Creating clusters, joining nodes to clusters, or enabling or disabling cluster nodes
Packaging log files or debug files for remote analysis
Rebooting the Secure Access device
Communication Between a Secure Access Device and NSM Overview on page 3
Chapter 1: Understanding Secure Access Device Configuration
5
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?
Questions and answers