Working With Secure Access Templates; Chapter 5 Working With Secure Access Templates; Creating And Applying A Secure Access Device Template; Creating The Template - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 5

Working with Secure Access Templates

Creating and Applying a Secure Access Device Template

Creating the Template

Copyright © 2010, Juniper Networks, Inc.
Creating and Applying a Secure Access Device Template on page 29
Promoting a Secure Access Device Configuration to a Template on page 31
You can create and apply configuration templates for setting up new Secure access
devices through NSM.
Create and apply templates by following these procedures:
Creating the Template on page 29
1.
Applying the Template on page 30
2.
To create a Secure Access template:
From the left pane of the NSM UI, click Configure.
1.
Expand Device Manager and select Device Templates. The Device Templates
2.
workspace appears on the right side of the screen.
Click the Device Template Tree tab, click the New button, and select SA Template.
3.
The New Device Template dialog box appears.
Name the Secure Access device template, and select a color for the template.
4.
Enter the following basic information:
5.
Device description
IP address
Admin username
Admin user password
Click OK to save the template. The newly created templates will appear under the
6.
Device Template Tree.
Double-click the newly created template to enter the configuration information. The
7.
Device Template screen appears.
29

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager

Table of Contents