Configuring Secure Access Devices Guide
Related
Documentation
Adding a Secure Access Cluster with Imported Cluster Members
24
Secure Access devices configured in a cluster must have a cluster object and member
objects defined in the NSM before the Secure Access cluster nodes can be recognized
by NSM. Nodes from this cluster that subsequently contact NSM will be represented by
fully functional member icons in the Cluster Manager. Cluster members whose DMI agents
do not contact NSM will be displayed in the NSM Device Monitor as unconnected devices.
Secure Access devices use member IDs to identify each cluster member object. When
importing cluster members, the member ID is imported as part of the cluster.
To add a Secure Access cluster to NSM, first add the cluster object, and then add its
members. You add cluster members one at a time, in a similar manner to adding
standalone devices.
NOTE: Adding a cluster and adding a cluster member have no effect on the
cluster itself. The cluster and cluster members must already exist.
Once a Secure Access cluster is managed by NSM, subsequent changes applied to the
cluster by NSM will be synchronized by the cluster across all cluster members. Similarly,
changes to a Secure Access cluster membership that occur through administrator action
on the native device UI will be reflected back to NSM, and NSM will display the modified
cluster.
You can add a Secure Access cluster from your existing network into NSM and import
their configurations. Using the Add Device Wizard, you configure a connection between
the management system and the physical device, and then import all device parameters.
Adding a Secure Access Cluster with Imported Cluster Members on page 24
Creating and Applying a Secure Access Device Template on page 29
Promoting a Secure Access Device Configuration to a Template on page 31
Add and import a Secure Access cluster in NSM by following these procedures:
Installing and Configuring the Cluster on page 25
1.
Adding the Cluster in NSM on page 25
2.
3.
Adding the Cluster Members in NSM on page 25
Configuring and Activating the DMI Agent on the Cluster on page 27
4.
Importing Cluster Configuration on page 27
5.
Copyright © 2010, Juniper Networks, Inc.
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?
Questions and answers