Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 39

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation
Copyright © 2010, Juniper Networks, Inc.
A delta configuration summary shows you the differences between the configuration
you see in the NSM UI and the configuration on the physical device. To get a delta
configuration summary in NSM, from the Devices menu click Configuration and select
Summarize Delta Config. The Get Delta Config Summary dialog box appears with a list
of devices to which you have access. Select the device you just imported and click OK.
NSM queries the physical device to obtain a list of all CLI commands or XML messages
used in the device configuration, compares that list with the UI device configuration, and
generates a summary report of all differences, or deltas, discovered.
For a just-imported device, the delta config summary displays minimal deltas, meaning
that very few differences exist between the configuration on the physical device and the
configuration in the UI. NSM automatically imports your VPNs and displays the VPN
policies; however, NSM does not create VPN abstractions for your VPN policies.
Get Running Configuration
A running configuration summary shows you the exact CLI commands or XML messages
that were used to create the current device configuration on the physical device. To get
the running config summary in the NSM application, from the Devices menu click
Configuration and select Get Running Config. The Get Running Config dialog box appears.
You see a list of devices to which you have access. Select the device you just imported
and click OK.
NSM queries the physical device to obtain a list of all CLI commands used in the device
configuration and generates a summary report that lists those commands. For a
just-imported device, the get running config summary report displays the device
configuration currently running on the physical device.
Adding a Secure Access Cluster Overview on page 23
Adding a Secure Access Cluster with Imported Cluster Members on page 24
Creating and Applying a Secure Access Device Template on page 29
Importing Multiple Secure Access Devices on page 16
Chapter 3: Adding Secure Access Devices
21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents