Sign In
Upload
Manuals
Brands
Juniper Manuals
Software
NETWORK AND SECURITY MANAGER
Juniper NETWORK AND SECURITY MANAGER Manuals
Manuals and User Guides for Juniper NETWORK AND SECURITY MANAGER. We have
4
Juniper NETWORK AND SECURITY MANAGER manuals available for free PDF download: Manual, Configuration Manual, Release Note
Juniper NETWORK AND SECURITY MANAGER Manual (340 pages)
Configuring Secure Access Devices Guide
Brand:
Juniper
| Category:
Software
| Size: 3.38 MB
Table of Contents
Table of Contents
7
About this Guide
13
Audience
13
Document Conventions
13
Objectives
13
List of Technical Publications
15
Requesting Technical Support
16
Opening a Case with JTAC
16
Self-Help Online Tools and Resources
16
Getting Started
19
Chapter 1 Understanding Secure Access Device Configuration
21
Communication between a Secure Access Device and NSM Overview
21
NSM and Secure Access Device Management Overview
21
Understanding Secure Access Device Configuration
21
Secure Access Device Services and Device Configurations Supported in NSM
23
Chapter 2 Secure Access Device and NSM Installation Overview
25
Secure Access Device Installation Overview
25
NSM Installation Overview
25
Integrating Secure Access Devices
27
Chapter 3 Adding Secure Access Devices
29
Importing a Secure Access Device
29
Installing and Configuring a Secure Access Device
29
Adding a Secure Access Device through NSM
30
Configuring and Activating the NSM Agent on the Secure Access Device
31
Configuration
32
Requirements for Importing a Secure Access Device into NSM through a Reachable Workflow
32
Adding a Secure Access Device through a Reachable Workflow
33
Importing Multiple Secure Access Devices
34
Creating the CSV File
34
Validating the CSV File
35
Adding and Importing Multiple Secure Access Devices
36
Verifying Imported Device Configurations
37
Using Device Manager
37
Using Device Monitor
37
Using Configuration Summaries
38
Using Job Manager
38
Adding Secure Access Clusters
41
Chapter 4 Adding Secure Access Clusters
41
Adding a Secure Access Cluster Overview
41
Adding a Secure Access Cluster with Imported Cluster Members
42
Adding the Cluster in NSM
43
Adding the Cluster Members in NSM
43
Installing and Configuring the Cluster
43
Configuring and Activating the DMI Agent on the Cluster
45
Importing Cluster Configuration
45
Working with Secure Access Templates
47
Chapter 5 Working with Secure Access Templates
47
Creating and Applying a Secure Access Device Template
47
Creating the Template
47
Applying the Template
48
Promoting a Secure Access Device Configuration to a Template
49
Configuring Secure Access Devices
51
Configuring User Roles and Administrator Roles
53
Chapter 6 Configuring User Roles and Administrator Roles
53
Configuring Secure Access Device User Roles (NSM Procedure)
53
Creating Secure Access Role-Based Source IP Alias (NSM Procedure)
56
Configuring Secure Access General Session Options (NSM Procedure)
57
Creating and Configuring Secure Access Device Administrator Roles
61
Procedure)
61
Configuring Terminal Services Using Remote Access Mechanism
69
Chapter 7 Configuring Terminal Services Using Remote Access Mechanism
69
Configuring Terminal Services on a Secure Access Device User Role
69
Procedure)
70
Configuring Terminal Services Using Remote Access Mechanism
69
Terminal Services Overview
69
Terminal Services User Experience
79
Related Documentation
80
Terminal Services Execution
80
Configuring Access Options Using Remote Access Mechanisms
83
Chapter 8 Configuring Access Options Using Remote Access Mechanisms
83
Configuring Access Options Using Remote Access Mechanisms Overview
83
Configuring File Rewriting on a Secure Access Device User Role (NSM
83
Configuring File Rewriting on a Secure Access Device User Role (NSM Procedure)
84
Configuring Network Connect on a Secure Access Device User Role
87
Procedure)
87
Configuring Network Connect on a Secure Access Device User Role (NSM Procedure)
87
Configuring Secure Application Manager on a Secure Access Device User Role (NSM Procedure)
92
Configuring Secure Meeting on a Secure Access Device User Role (NSM Procedure)
97
Configuring Web Rewriting on a Secure Access Device User Role (NSM Procedure)
102
Configuring Telnet/Ssh on a Secure Access Device User Role
108
Configuring Telnet/Ssh on a Secure Access Device User Role (NSM Procedure)
108
Configuring Secure Access Resource Profiles
111
Chapter 9 Configuring Secure Access Resource Profiles
111
Configuring a Citrix Terminal Services (Custom ICA) Resource Profile (NSM
111
Configuring a JSAM Resource Profile (NSM Procedure)
111
Configuring Secure Access Resource Profiles
111
Procedure)
111
Configuring a Citrix Terminal Services (Custom ICA) Resource Profile
113
Procedure)
117
Configuring a Citrix Terminal Services (Default ICA) Resource Profile (NSM Procedure)
117
Configuring a Citrix Listed Application Resource Profile (NSM Procedure)
122
Configuring Citrix Web Applications Resource Profile (NSM Procedure)
128
Configuring Custom Web Applications Resource Profile (NSM Procedure)
130
Configuring File Rewriting Resource Profiles (NSM Procedure)
138
Configuring Windows Terminal Services (NSM Procedure)
142
Configuring a Telnet/Ssh Resource Profile (NSM Procedure)
147
Configuring WSAM Resource Profile (NSM Procedure)
149
Configuring Bookmarks for Virtual Desktop Resource Profiles
152
Configuring Bookmarks for Virtual Desktop Resource Profiles (NSM Procedure)
152
Configuring Secure Access Resource Policies
155
Chapter 10 Configuring Secure Access Resource Policies
155
Configuring a File Rewriting Resource Policy (NSM Procedure)
155
Configuring Secure Access Resource Policies
155
Procedure)
155
Configuring a Secure Application Manager Resource Policy
162
Configuring a Secure Application Manager Resource Policy (NSM Procedure)
162
Procedure)
164
Configuring a Telnet and Secure Shell Resource Policy (NSM Procedure)
164
Configuring a Terminal Service Resource Policy (NSM Procedure)
167
Configuring Web Rewriting Resource Policies (NSM Procedure)
169
Configuring a Network Connect Connection Profile Resource Policy
173
Procedure)
173
Defining Network Connect Split Tunneling Policies (NSM Procedure)
177
Configuring Authentication and Directory Servers
179
Chapter 11 Configuring Authentication and Directory Servers
179
Creating a Custom Expression for an Authentication Server
181
Creating a Custom Expression for an Authentication Server (NSM Procedure)
181
Procedure)
181
Configuring a Secure Access Local Authentication Server Instance
182
Configuring a Secure Access Local Authentication Server Instance (NSM Procedure)
182
Procedure)
182
Configuring a Secure Access LDAP Server Instance (NSM Procedure)
185
Configuring a Secure Access RADIUS Server Instance (NSM Procedure)
189
Configuring a Secure Access Anonymous Server Instance (NSM Procedure)
192
Configuring a Secure Access Etrust Siteminder Server Instance
192
Configuring a Secure Access Etrust Siteminder Server Instance (NSM Procedure)
192
Procedure)
192
Configuring a Secure Access Certificate Server Instance (NSM Procedure)
202
Configuring a Secure Access Manual CA Certificate (NSM Procedure)
203
Configuring a Secure Access SAML Server Instance (NSM Procedure)
206
Configuring a Secure Access Active Directory or NT Domain Instance
208
Configuring a Secure Access Active Directory or NT Domain Instance (NSM Procedure)
208
Procedure)
208
Configuring a Secure Access NIS Server Instance (NSM Procedure)
211
Chapter 12 Configuring Authentication Realms
213
Configuring Secure Access Authentication Realms (NSM Procedure)
213
Configuring Secure Access Authentication Policies (NSM Procedure)
216
Configuring Secure Access Role Mapping Rules (NSM Procedure)
221
Chapter 13 Configuring Sign-In Policies and Sign-In
225
Configuring a Secure Access ACE Server Instance (NSM Procedure)
179
Configuring Secure Access Sign-In Policies (NSM Procedure)
225
Creating Authorization-Only Policies
225
Creating User or Administrator Urls
227
Creating Meeting Urls
228
Configuring Secure Access Sign-In Pages (NSM Procedure)
229
Creating Users/Administrator Sign-In
229
Creating Meeting Sign-In Pages
231
Configuring Single Sign-On
235
Chapter 14 Configuring Single Sign-On
235
Configuring Single Sign-On
235
Defining Basic, NTLM, and Kerberos Resources
235
Configuring Basic, NTLM, and Kerberos Resources (NSM Procedure)
236
Defining a Basic Authentication, NTLM, or Kerberos Intermediation Resource Policy (NSM Procedure)
239
Configuring a SAML Access Control Resource Policy (NSM Procedure)
241
Configuring SAML SSO Artifact Profile Resource Policy (NSM Procedure)
244
Configuring Secure Access Host Checker Policies
249
Chapter 15 Configuring Secure Access Host Checker Policies
249
Configuring Secure Access Host Checker Policies
249
Setting up Secure Access Device Host Checker Options (NSM Procedure)
249
Configuring General Host Checker Remediation (NSM Procedure)
251
Configuring Host Checker Third-Party Applications Using Predefined Rules
252
Procedure)
252
Configuring Host Checker Third-Party Applications Using Predefined Rules (NSM Procedure)
252
Configuring the Remote Integrity Measurement Verifier Server
258
Configuring the Remote Integrity Measurement Verifier Server (NSM Procedure)
258
Procedure)
259
Configuring Host Checker Customized Requirements Using Custom Rules
259
Configuring Host Checker Customized Requirements Using Custom Rules (NSM Procedure)
259
Enabling Advanced Endpoint Defense (NSM Procedure)
264
Enabling Predefined Client-Side Policies for Windows Only
265
Enabling Connection Control Policies
265
Procedure)
265
Enabling Predefined Client-Side Policies for Windows Only (NSM Procedure)
265
Configuring Virus Signature Version Monitoring (NSM Procedure)
266
Importing Virus Signature Version Monitoring or Patch Management Version Monitoring List (NSM Procedure)
267
Assigning a Proxy Server an Auto-Update Server (NSM Procedure)
268
Chapter 16 Configuring Secure Access Cache Cleaner
269
Configuring Global Cache Cleaner Options (NSM Procedure)
269
Configuring Cache Cleaner Restrictions (NSM Procedure)
272
Chapter 17 Configuring Secure Access System Management Features
275
Configuring the Network Communications Protocol (NSM Procedure)
275
Configuring Secure Meetings (NSM Procedure)
277
Configuring Global Security (NSM Procedure)
279
Configuring Sensors (NSM Procedure)
283
Creating a Custom Expression for Sensor Settings (NSM Procedure)
286
Chapter 18 Configuring Network Settings
289
Configuring General Network Settings (NSM Procedure)
289
Configuring Internal Ports (NSM Procedure)
291
Configuring Hosts (NSM Procedure)
293
Configuring Internet Protocol Filters (NSM Procedure)
294
Chapter 19 Synchronizing User Records
295
Enabling User Record Synchronization (NSM Procedure)
296
Configuring the Authentication Server (NSM Procedure)
297
Configuring the User Record Synchronization Server (NSM Procedure)
297
Configuring the Client (NSM Procedure)
298
Configuring the Database (NSM Procedure)
299
Configuring If-Map Federation Settings
301
Chapter 20 Configuring IF-MAP Federation Settings
301
Configuring IF-MAP Servers (NSM Procedure)
301
Configuring IF-MAP Client Settings on the Secure Access Device (NSM
301
Configuring IF-MAP Client Settings on the Secure Access Device
302
Configuring IF-MAP Client Settings on the Secure Access Device (NSM Procedure)
302
Procedure)
303
Configuring IF-MAP Session Export Policy on the Secure Access Device (NSM Procedure)
303
Procedure)
306
Configuring IF-MAP Session Import Policy on the Secure Access Device (NSM Procedure)
306
Configuring IF-MAP Server Replicas (NSM Procedure)
308
Part 4 Managing Secure Access Devices
311
Managing Secure Access Devices
313
Chapter 21 Managing Secure Access Devices
313
Managing Large Binary Data Files (NSM Procedure)
313
Removing a Secure Access Device from NSM Management
314
Procedure)
314
Archiving Secure Meetings (NSM Procedure)
315
Managing Secure Access Node from a Cluster
316
Troubleshooting Secure Access Device Federated Networks
319
Chapter 22 Troubleshooting Secure Access Device Federated Networks
319
Troubleshooting the IF-MAP Federation Network (NSM Procedure)
319
Part 5 Monitoring Secure Access Devices
321
Configuring Logs in Secure Access Devices
323
Configuring User Access, Admin Access, Events and Sensors
323
Procedure)
323
Configuring Custom Filters and Formats for Log Files (NSM Procedure)
326
Configuring Client-Side Logs (NSM Procedure)
328
Configuring Custom Log Filters (NSM Procedure)
329
Chapter 23 Configuring Logs in Secure Access Devices
323
Viewing Logs in Secure Access Devices
331
Chapter 24 Viewing Logs in Secure Access Devices
331
Viewing Device Status
331
Viewing Device Monitor Alarm Status
334
Monitoring the Secure Access as an SNMP Agent (NSM Procedure)
335
Index
337
Part 6 Index
337
Index
339
Advertisement
Juniper NETWORK AND SECURITY MANAGER Configuration Manual (174 pages)
NSM Configuration Guide for EX Series Devices
Brand:
Juniper
| Category:
Software
| Size: 2.1 MB
Table of Contents
Table of Contents
7
About this Guide
11
Audience
11
Conventions
11
Objectives
11
Documentation
13
Requesting Technical Support
14
Self-Help Online Tools and Resources
15
Opening a Case with JTAC
15
Managing EX-Series Switches with NSM
17
Chapter 1 Configuring User Access and Authentication
19
Configuring RADIUS Authentication (NSM Procedure)
19
Configuring TACACS+ Authentication (NSM Procedure)
20
Configuring Authentication Order (NSM Procedure)
21
Configuring User Access (NSM Procedure)
22
Configuring Login Classes
22
Configuring User Accounts
23
Configuring Template Accounts (NSM Procedure)
23
Creating a Remote Template Account
24
Creating a Local Template Account
25
Chapter 2 Configuring Chassis
27
Configuring Aggregated Devices (NSM Procedure)
27
Configuring Chassis
27
Configuring Chassis Alarms (NSM Procedure)
28
Configuring Routing Engine Redundancy (NSM Procedure)
29
Chapter 3 Configuring Class of Service
31
Configuring Cos Classifiers (NSM Procedure)
31
Configuring Cos Code Point Aliases (NSM Procedure)
33
Configuring Cos Drop Profile (NSM Procedure)
35
Configuring Cos Forwarding Classes (NSM Procedure)
37
Configuring Cos Interfaces (NSM Procedure)
38
Configuring Cos Rewrite Rules (NSM Procedure)
44
Configuring Cos Schedulers (NSM Procedure)
47
Configuring Cos and Applying Scheduler Maps (NSM Procedure)
48
Chapter 4 Configuring Ethernet Switching Options
51
Configuring Port Mirroring to Analyze Traffic on EX-Series Switches
51
Procedure)
51
Configuring Redundant Trunk Links (NSM Procedure)
52
Configuring Port Security (NSM Procedure)
53
Configuring Static IP (NSM Procedure)
55
Configuring Voip (NSM Procedure)
56
Chapter 5 Configuring Firewall Filters
59
Configuring a Firewall Filter
59
Configuring a Policer for a Firewall Filter
62
Chapter 6 Configuring Policy Options
65
Configuring an as Path in a BGP Routing Policy (NSM Procedure)
65
Configuring an as Path Group in a BGP Routing Policy (NSM Procedure)
66
Configuring a Community for Use in BGP Routing Policy Conditions
67
Procedure)
67
Configuring a BGP Export Policy Condition (NSM Procedure)
68
Configuring Flap Damping to Reduce the Number of BGP Update Messages(NSM Procedure)
69
Configuring a Routing Policy Statement (NSM Procedure)
71
Configuring Prefix List (NSM Procedure)
72
Chapter 7 Configuring Routing Options
75
Configuring Maximum Prefixes (NSM Procedure)
75
Configuring Multicast (NSM Procedure)
77
Configuring Multipath (NSM Procedure)
80
Configuring Options (NSM Procedure)
81
Configuring Route Resolution (NSM Procedure)
82
Configuring Routing Table Groups (NSM Procedure)
83
Configuring Routing Tables (NSM Procedure)
85
Configuring Source Routing (NSM Procedure)
87
Configuring Static Routes (NSM Procedure)
88
Configuring Generated Routes (NSM Procedure)
89
Configuring Graceful Restart (NSM Procedure)
90
Configuring Forwarding Table (NSM Procedure)
91
Configuring Flow Route (NSM Procedure)
93
Configuring Fate Sharing (NSM Procedure)
95
Configuring Martian Addresses (NSM Procedure)
96
Configuring Interface Routes (NSM Procedure)
98
Configuring Instance Export (NSM Procedure)
99
Configuring Instance Import (NSM Procedure)
100
Configuring Confederation (NSM Procedure)
100
Configuring Maximum Paths (NSM Procedure)
101
Chapter 8 Configuring Protocols
103
Configuring the BFD Protocol (NSM Procedure)
103
Configuring BGP (NSM Procedure)
104
Configuring 802.1X Authentication (NSM Procedure)
107
Configuring 802.1X Interface Settings
107
Configuring Static MAC Bypass
109
Configuring GVRP (NSM Procedure)
109
Configuring IGMP (NSM Procedure)
110
Configuring IGMP Snooping on EX-Series Switches (NSM Procedure)
112
Configuring LLDP (NSM Procedure)
113
Configuring Protocols
103
Configuring LLDP-MED (NSM Procedure)
114
Configuring MSTP (NSM Procedure)
115
Configuring OSPF (NSM Procedure)
117
Configuring RIP (NSM Procedure)
121
Configuring RSTP on EX-Series Switches (NSM Procedure)
123
Configuring STP (NSM Procedure)
124
Configuring VSTP (NSM Procedure)
126
Configuring VRRP (NSM Procedure)
128
Chapter 9 Configuring Poe
131
Configuring Poe
131
Configuring Power over Ethernet (NSM Procedure)
131
Chapter 10 Configuring SNMP
133
Configuring Basic System Identification for SNMP (NSM Procedure)
133
Configuring SNMP
133
Configuring Client Lists (NSM Procedure)
134
Configuring SNMP Health Monitoring (NSM Procedure)
136
Configuring the Interfaces on Which SNMP Requests Can be Accepted
137
Procedure)
137
Configuring the Interfaces on Which SNMP Requests Can be Accepted (NSM Procedure)
137
Configuring the SNMP Local Engine ID (NSM Procedure)
139
Configuring the SNMP Commit Delay Timer (NSM Procedure)
140
Configuring SNMP RMON Alarms and Events (NSM Procedure)
141
Enabling SNMP Access over Routing Instances (NSM Procedure)
145
Configuring Snmpv3 (NSM Procedure)
147
Configuring Tracing of SNMP Activity (NSM Procedure)
153
Configuring SNMP Views (NSM Procedure)
155
Configuring SNMP Communities (NSM Procedure)
156
Configuring SNMP Trap Options (NSM Procedure)
158
Configuring SNMP Trap Groups (NSM Procedure)
160
In the NSM Navigation Tree, Select Device Manager > Devices
160
Click One
160
Chapter 11 Configuring Virtual Lans
163
Configuring Vlans (NSM Procedure)
163
Chapter 12 Configuring a Virtual Chassis
165
Configuring a Virtual Chassis with a Preprovisioned Configuration File
165
Add a Member to a Virtual Chassis
166
Index
169
Index
171
Juniper NETWORK AND SECURITY MANAGER Release Note (39 pages)
Brand:
Juniper
| Category:
Software
| Size: 0.69 MB
Table of Contents
Table of Contents
1
Version Summary
3
New Features
3
New or Changed Information
3
Before You Install NSM
3
Solaris Locales
3
Upgrade Considerations
3
Upgrading NSM
3
Deprecated Operating System
4
Limitations
4
Important SSL VPN and Infranet Controller Instructions
4
NSM Server
4
Setting up NSM to Work with Infranet Controller and Infranet Enforcer
6
Usage Guidelines for Applying NSM Templates to SA and IC Clusters
8
Recommended
8
Not Recommended
8
Best Practices
9
Maintaining the NSM GUI Server
9
NSM Server
9
Addressed Issues
11
Release 2010.3
11
Release 2010.2
13
Release 2010.1
16
Known Issues
20
Nsm
20
EX Series Switches
30
Devices Running Screenos and IDP
31
Secure Access SSL VPN SA Series and United Access Control Infranet Controllers
32
SRX Series Services Gateways
33
Errata and Changes in Documentation for NSM Release 2010.3
34
Errata
34
NSM Documentation and Release Notes
36
Documentation Feedback
36
Requesting Technical Support
37
Revision History
39
Advertisement
Juniper NETWORK AND SECURITY MANAGER Release Note (33 pages)
Brand:
Juniper
| Category:
Software
| Size: 0.64 MB
Table of Contents
Table of Contents
1
Version Summary
2
New or Changed Information
2
Before You Install NSM
2
Solaris Locales
2
Upgrade Considerations
3
Upgrading NSM
3
Deprecated Operating System
3
Limitations
3
Important SSL VPN and Infranet Controller Instructions
4
NSM Server
4
Setting up NSM to Work with Infranet Controller and Infranet Enforcer
5
Usage Guidelines for Applying NSM Templates to SA and IC Clusters
7
Recommended
7
Not Recommended
7
Best Practices
8
Maintaining the NSM GUI Server
8
NSM Server
8
Addressed Issues
10
Known Issues
17
Nsm
17
EX Series Switches
28
Devices Running Screenos and IDP
28
Secure Access SSL VPN SA Series and United Access Control Infranet Controllers
29
SRX Series Services Gateways
30
NSM Documentation and Release Notes
31
Documentation Feedback
31
Requesting Technical Support
32
Revision History
33
Advertisement
Related Products
Juniper NETWORK AND SECURITY MANAGER - NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3
Juniper NETWORK AND SECURITY MANAGER NSMXPRESS - REV1
Juniper TEPM AGENT - RELEASE NOTES 17-12-10
Juniper Networks JUNOS 10.1
Juniper NETWORK AND SECURITY MANAGER NSMXPRESS
Juniper NETWORK AND SECURITY MANAGER NSMXPRESS SERIES II
Juniper Juniper Networks
Juniper NETSCREEN-200 SERIES
Juniper NetScreen-204
Juniper NetScreen-208
Juniper Categories
Network Router
Switch
Gateway
Software
Network Hardware
More Juniper Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL