Adding A Secure Access Device Through A Reachable Workflow - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation

Adding a Secure Access Device Through a Reachable Workflow

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
Adding a Secure Access Device Through a Reachable Workflow on page 15
Verifying Imported Device Configurations on page 19
To import a Secure Access device through a reachable workflow into NSM:
From the left pane of the NSM UI, click Configure.
1.
Expand Device Manager and select Devices. The Devices workspace appears on the
2.
right side of the screen.
Click the Device Tree tab, click the New button, and select Device. The New Device
3.
dialog box appears.
Select Device is Reachable and click Next.
4.
Enter the following connection information:
5.
Enter the IP address of the device.
Enter the username of the device administrator.
Enter the password for the device administrator.
Select SSH V2 as the connection method.
Ensure that the TCP port number is 22.
Click Next. The Verify Device Authenticity dialog box opens. The Add Device wizard
6.
displays the RSA Key FingerPrint information. To prevent man-in-the-middle attacks,
you should verify the fingerprint using an out-of-band method.
Click Next to accept the fingerprint. The Detecting Device dialog box opens.
7.
After the wizard displays the autodetected device information, verify that the device
8.
type, OS version, and the device serial number are correct. The wizard also detects
the hostname configured on the device. You can either use the hostname as the NSM
device name or you can enter a new name in the text box provided.
Click Next after verifying the auto detected device information.
9.
Click Finish to add the device to the NSM UI. The Secure Access device appears in the
10.
Devices workspace.
Requirements for Importing a Secure Access Device into NSM Through a Reachable
Workflow on page 14
Importing a Secure Access Device on page 11
Chapter 3: Adding Secure Access Devices
15

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager

Table of Contents