Configuring and Activating the NSM agent on the Secure Access Device
Copyright © 2010, Juniper Networks, Inc.
Enter an admin username for the device admin.
8.
Set the Admin User Password and the First Connection One-Time Password:
9.
Select Set Password and enter a new password.
Confirm your new password and click OK.
NOTE:
Make a note of the unique external ID. The device administrator will
need it to configure connectivity with NSM. The wizard automatically
enters this value for the device. This ID number represents the device
within the management system.
Specify the administrator username and password for the SSH
connection. This name and password must match the name and
password already configured on the device.
Specify the First Connection One Time Password (OTP) that
authenticates the device. Make a note of this password. The device
administrator will need it to configure the connectivity with NSM.
Click Finish to add the device to the NSM UI. The newly added Secure Access device
10.
appears in the Devices workspace.
You must configure and activate the NSM agent on the Secure Access device. It
establishes the SSH communications with the NSM application and controls the Secure
Access device from the NSM application.
To configure and activate the NSM agent:
Select System > Configuration > DMI Agent to add the NSM management application.
1.
Under DMI settings for outbound connections, enter the device server's IP address in
2.
the Primary Server box.
Enter 7804 in the Primary Port box.
3.
Fill in the Backup Server and Backup Port boxes, if a device server is configured for
4.
high availability.
Enter the unique external ID provided by the NSM administrator in the Device ID box.
5.
Enter the first connection one-time password provided by the NSM administrator in
6.
the HMAC box.
Click Enable to activate the NSM agent.
7.
Click Save Changes, and the device attempts to establish a session with the NSM
8.
application.
The device software initiates the TCP connection to NSM and identifies itself using the
specified device ID and HMAC. Both sides then engage in SSH Transport Layer interactions
Chapter 3: Adding Secure Access Devices
13
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?