User manual JUNIPER NETWORKS NETWORK AND SECURITY MANAGER NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual JUNIPER NETWORKS NETWORK AND SECURITY MANAGER. We hope that this JUNIPER NETWORKS NETWORK AND SECURITY MANAGER user guide will be useful to you.


JUNIPER NETWORKS NETWORK AND SECURITY MANAGER NSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3: Download the complete user guide (2055 Ko)

You may also download the following manuals related to this product:

   JUNIPER NETWORKS NETWORK AND SECURITY MANAGER RELEASE NOTES REV 1 (621 ko)
   JUNIPER NETWORKS NETWORK AND SECURITY MANAGER RELEASE NOTES REV 3 (672 ko)

Manual abstract: user guide JUNIPER NETWORKS NETWORK AND SECURITY MANAGERNSM CONFIGURATION GUIDE FOR EX SERIES DEVICES REV 3

Detailed instructions for use are in the User's Guide.

[. . . ] NSM Configuration Guide for EX Series Devices Release Published: 2010-11-15 Part Number: 530-028689-01, Revision 3 Copyright © 2010, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www. juniper. net This product includes the Envoy SNMP Engine, developed by Epilogue Technology, an Integrated Systems Company. This program and its documentation were developed at private expense, and no part of them is in the public domain. This product includes memory allocation software developed by Mark Moraes, copyright © 1988, 1989, 1993, University of Toronto. [. . . ] Enter the global static route in Defaults and destination address of the static route in Route. Configuring Source Routing (NSM Procedure) You can configure source routing to specify IP addresses of the devices along the path, that you want an IP packet to take on its way to its destination. To configure source routing in NSM: 1. In the navigation tree, select Device Manager > Devices. 2. Apply--To apply the routing option settings. NOTE: After you make changes to a device configuration, you must push that updated device configuration to the physical security device for those changes to take effect. See the Updating Devices section in the Network and Security Manager Administration Guide for more information. Table 44: Source Routing Fields Option Comment Function Specifies the comment for the source routing configuration. Your Action Enter the comment. Copyright © 2010, Juniper Networks, Inc. 71 Table 44: Source Routing Fields (continued) Option Ip Function Specifies the IPv4/IPv6 addressing family for source routing. Your Action Select the check box. Configuring Static Routes (NSM Procedure) You can configure static routes for a routing table group. A router uses static routes in the following scenarios: · When it does not have a route to a destination that has a better (lower) preference value. When it is forwarding unroutable packets. · · A static route is installed in the routing table only when the route is active; that is, the list of next-hop routers configured for that route contains at least one next hop on an operational interface. To configure static routes for a routing table group in NSM: 1. In the navigation tree, select Device Manager > Devices. 2. Apply--To apply the routing option settings. NOTE: After you make changes to a device configuration, you must push that updated device configuration to the physical security device for those changes to take effect. See the Updating Devices section in the Network and Security Manager Administration Guide for more information. 72 Copyright © 2010, Juniper Networks, Inc. Chapter 7: Configuring Routing Options Table 45: Static Fields Option Comment Function Specifies the comment for the static route. Specifies the routing table group name for which the static route is configured. These options only set the global defaults and apply to all the configured static routes. Your Action Enter the comment. Rib Group Enter the name. Defaults 1. Expand the Static tree and select Defaults. 2. Expand the Static tree and select Route. Route Enables you to configure the individual static routes options. These options apply to the individual destination only and override any options configured in the Defaults section. 2. Enter the individual route. Configuring Generated Routes (NSM Procedure) Generated routes are used as routes of last resort. A packet is forwarded to the route of last resort when the routing tables have no information about how to reach that packet's destination. One use of route generation is to create a default route to use if the routing table contains a route from a peer on a neighboring backbone network. A generated route becomes active when it has one or more contributing routes. A contributing route is an active route that is a specific match for the generated destination. For example, for the destination 128. 100. 0. 0/16, routes to 128. 100. 192. 0/19 and 128. 100. 67. 0/24 are contributing routes, but routes to 128. 0. 0. 0. /8, 128. 0. 0. 0/16, and 128. 100. 0. 0/16 are not. However, an active generated route can recursively contribute to a less specific matching generated route. For example, a generated route to the destination 128. 100. 0. 0/16 can contribute to a generated route to 128. 96. 0. 0/13. By default, when generated routes are installed in the routing table, the next hop device selects from the primary contributing route. [. . . ] The role is determined by the mastership priority value and other factors in the master election algorithm. Configuring a Virtual Chassis with a Preprovisioned Configuration File on page 149 · 1. 2. Add a Member to a Virtual Chassis on page 150 Configuring a Virtual Chassis with a Preprovisioned Configuration File To configure a virtual chassis using a preprovisioned configuration: 1. Make a list of the serial numbers of all the switches to be connected as a virtual chassis. 2. If you configure the member with a routing-engine role, it is eligible to function as a master or backup. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE JUNIPER NETWORKS NETWORK AND SECURITY MANAGER




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual JUNIPER NETWORKS NETWORK AND SECURITY MANAGER will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.