Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are
owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312,
6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Network and Security Manager M-series and MX-series Devices
READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE.
BY DOWNLOADING, INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS
CONTAINED HEREIN, YOU (AS CUSTOMER OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO
BIND THE CUSTOMER)CONSENT TO BE BOUNDBY THIS AGREEMENT.IF YOUDO NOTOR CANNOT AGREE TO THE TERMS CONTAINED
HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS
REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or
Juniper Networks (Cayman) Limited (ifthe Customer’sprincipal officeis located outsidethe Americas) (such applicable entitybeing referred
to herein as“Juniper”),and (ii) the person or organization thatoriginally purchased from Juniperor an authorized Juniperreseller the applicable
license(s) for use of the Software (“Customer”) (collectively, the “Parties”).
2. The Software. In this Agreement, “Software” means the program modules and features of the Juniper or Juniper-supplied software, for
which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller, or which was embedded by
Juniper in equipment which Customer purchased from Juniper or an authorized Juniper reseller. “Software” also includes updates, upgrades
and new releases of such software. “Embedded Software” means Software which Juniper has embedded in or loaded onto the Juniper
equipment and any updates, upgrades, additions or replacements which are subsequently embedded in or loaded onto the equipment.
3. License Grant. Subject topayment of the applicablefees and the limitations and restrictions set forth herein, Juniper grants toCustomer
a non-exclusive and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the
following use restrictions:
a. Customer shall use Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by
Customer from Juniper or an authorized Juniper reseller.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units
for which Customer has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access
Client software only, Customer shall use such Software on a single computer containing a single physical random access memory space
and containing any number of processors. Use of the Steel-Belted Radius or IMS AAA software on multiple computers or virtual machines
(e.g., Solaris zones) requires multiple licenses, regardless of whether such computers or virtualizations are physically contained on a single
chassis.
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may
specify limitsto Customer’s useof the Software. Suchlimits may restrictuse to amaximum numberof seats, registered endpoints, concurrent
users, sessions, calls, connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of
separate licenses to use particular features, functionalities, services, applications, operations, or capabilities, or provide throughput,
performance, configuration, bandwidth, interface, processing, temporal, or geographical limits. In addition, such limits may restrict the use
of the Software to managing certain kinds of networks or require the Software to be used only in conjunction with other specific Software.
Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable licenses.
d. For any trial copy of the Software, Customer’s right to use the Software expires 30 days after download, installation or use of the
Software. Customer may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not
extend or create an additional trial period by re-installing the Software after the 30-day trial period.
e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer’s
enterprise network. Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the
Steel-Belted Radius software to support any commercial network access services.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase
the applicable license(s) for the Software from Juniper or an authorized Juniper reseller.
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees
not to and shall not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized
copies of the Software (except as necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the
Software,in any form, toany thirdparty; (d)remove any proprietarynotices, labels,or marks on orin any copy of the Softwareor any product
in which the Software is embedded; (e) distribute any copy of the Software to any third party, including as may be embedded in Juniper
equipment sold inthe secondhand market; (f)use any ‘locked’ orkey-restricted feature,function, service, application, operation, orcapability
without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even if such feature, function, service, application,
operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper to any third party; (h) use the
Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper reseller; (i)
use Embedded Software on non-Juniper equipment; (j) use Embedded Software (or make it available for use) on Juniper equipment that
the Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking
of the Software to any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly
provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper,
Customer shall furnish such records to Juniper and certify its compliance with this Agreement.
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper.
As such, Customer shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence,
which at a minimum includes restricting access to the Software to Customer employees and contractors having a need to use the Software
for Customer’s internal business purposes.
7. Ownership. Juniper and Juniper’s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to
the Software, associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance
of any right, title, or interest in the Software or associated documentation, or a sale of the Software, associated documentation, or copies
of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty
statementthat accompaniesthe Software (the“Warranty Statement”).Nothing inthis Agreement shallgive riseto any obligation to support
the Software. Support services may be purchased separately. Any such support shall be governed by a separate, written support services
agreement. TO THE MAXIMUM EXTENT PERMITTED BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA,
OR COSTSOR PROCUREMENTOF SUBSTITUTEGOODS ORSERVICES,OR FOR ANY SPECIAL,INDIRECT,OR CONSEQUENTIALDAMAGES
ARISING OUTOF THIS AGREEMENT,THE SOFTWARE,OR ANY JUNIPEROR JUNIPER-SUPPLIEDSOFTWARE. INNO EVENT SHALLJUNIPER
BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE.
EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW, JUNIPER DISCLAIMS ANY
AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES
JUNIPER WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT
ERROR OR INTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper’s or its suppliers’
or licensors’ liability to Customer, whether in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid
by Customer for the Software that gave rise to the claim, or if the Software is embedded in another Juniper product, the price paid by
Customer for such other product. Customer acknowledges and agrees that Juniper has set its prices and entered into this Agreement in
reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same reflect an allocation of risk between
the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss), and that the same
form an essential basis of the bargain between the Parties.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination
of the license granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related
documentation in Customer’s possession or control.
10. Taxes. All license fees payable under this agreement are exclusive of tax. Customer shall be responsible for paying Taxes arising from
the purchase of the license, or importation or use of the Software. If applicable, valid exemption documentation for each taxing jurisdiction
shall be provided to Juniper prior to invoicing, and Customer shall promptly notify Juniper if their exemption is revoked or modified. All
payments made by Customer shall be net of any applicable withholding tax. Customer will provide reasonable assistance to Juniper in
connection with such withholding taxes by promptly: providing Juniper with valid tax receipts and other required documentation showing
Customer’s payment of any withholding taxes; completing appropriate applications that would reduce the amount of withholding tax to
be paid; and notifying and assisting Juniper in any audit or tax proceeding related to transactions hereunder. Customer shall comply with
all applicable tax laws and regulations, and Customer will promptly pay or reimburse Juniper for all costs and damages related to any
liability incurred by Juniper as a result of Customer’s non-compliance or delay with its responsibilities herein. Customer’s obligations under
this Section shall survive termination or expiration of this Agreement.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any
applicable foreign agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such
restrictions, laws or regulations, or without all necessary approvals. Customer shall be liable for any such violations. The version of the
Software supplied to Customer may contain encryption or other capabilities restricting Customer’s ability to export the Software without
an export license.
12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use,
duplication, or disclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS
227.7201 through 227.7202-4, FAR 12.212, FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer
with the interface information needed to achieve interoperability between the Software and another independently created program, on
payment of applicable fee, if any. Customer shall observe strict obligations of confidentiality with respect to such information and shall use
such information in compliance with any applicable terms and conditions upon which Juniper makes such information available.
14. Third Party Software. Any licensor of Juniper whose software is embedded in the Softwareand any supplier of Juniper whose products
or technology are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement,
and such licensor or vendor shall have the right to enforce this Agreement in itsown name asif it were Juniper. In addition, certain third party
software may be provided with the Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent
portions of the Software are distributed under and subject to open source licenses obligating Juniper to make the source code for such
portions publicly available (such as the GNU General Public License (“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper
will make such source code portions (including Juniper modifications, as appropriate) available upon request for a period of up to three
years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N. Mathilda Ave., Sunnyvale, CA
94089, ATTN: General Counsel. You may obtain a copy of the GPL at http://www.gnu.org/licenses/gpl.html, and a copy of the LGPL
at http://www.gnu.org/licenses/lgpl.html .
15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws
principles. The provisions of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes
arising under this Agreement, the Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal
courts within Santa Clara County, California. This Agreement constitutes the entire and sole agreement between Juniper and the Customer
with respect to the Software, and supersedes all prior and contemporaneous agreements relating to the Software, whether oral or written
(including any inconsistent terms contained in a purchase order), except that the terms of a separate written agreement executed by an
authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict with terms contained
herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in writing
by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity
of the remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the
Parties agree that the English version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de
même que tous les documents y compris tout avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that
this Agreement and all related documentation is and will be in the English language)).
Juniper Networks Network and Security Manager (NSM) is a software application that
centralizescontrol and management of your Juniper Networksdevices. With NSM, Juniper
Networks delivers integrated, policy-based security and network management for all
devices.
M-series and MX-series devices are routers that run JUNOS software using the
command-line interface (CLI) for installation and configuration.
This guide provides the information you need to understand, configure, and maintain an
M-series or MX-series device using NSM. This guide explains how to use basic NSM
functionality, includingadding newdevices, deploying newdevice configurations, updating
device firmware, and monitoringthe status of your M-series or MX-series device. Use this
guide in conjunction with the NSM Online Help,which provides step-by-step instructions
that complement the information in this guide.
NOTE: If the information in the latest NSM Release Notes differs from the information
in this guide, follow the NSM Release Notes.
Audience
This guide is for the system administrator responsible for configuring the M-series and
MX-series devices.
Documentation Conventions
The sample screens used throughout this guide are representations of the screens that
appear when you install and configure the NSM software. The actual screens may differ.
Table 3 on page xxix defines syntax conventions used in this guide.
Table 3: Syntax Conventions
About This Guide
ExamplesDescriptionConvention
terminal lengthRepresent keywordsWords in plain text
mask, accessListNameRepresent variablesWords in italics
Words separated by the pipe ( | )
symbol
Words enclosed in brackets followed
by and asterisk ( [ ]*)
Documentation
Table 4 on page xxix describes documentation for the NSM.
Table 4: Network and Security Manager Publications
Network and Security
Manager Installation Guide
variable to the left or right of this symbol. The
keywordor variable canbe optional or required.
can be entered more than once.
Represent required keywords or variables.Words enclosed in braces ( { } )
DescriptionBook
Describes the steps to install the NSM management system on a
single server or on separate servers. It also includes information on
how to install and run the NSMuser interface.This guideis intended
for IT administrators responsible for the installation or upgrade of
NSM.
diagnostic | lineRepresent a choice to select one keyword or
[ internal | external ]Represent optional keywords or variables.Words enclosed in brackets ( [ ] )
[ level1 | level2 | 11 ]*Represent optional keywords or variables that
Network and Security
Manager Configuring
ScreenOS and IDP Devices
Guide
Describes how to use and configure key management features in
the NSM. Itprovides conceptual information, suggested workflows,
and examples. This guide is best used in conjunction with the NSM
Online Help,which provides step-by-step instructions for performing
management tasks in the NSM UI.
This guide is intended for application administrators or those
individuals responsible for owning the server and security
infrastructure and configuring the product for multi-user systems.
It is also intended for device configuration administrators, firewall
and VPN administrators, and network security operation center
administrators.
Provides details about configuring the device features for all
supported ScreenOS and IDP platforms.
Table 4: Network and Security Manager Publications (continued)
DescriptionBook
Network and Security
Manager Online Help
Network and Security
Manager API Guide
Network and Security
Manager Release Notes
Configuring Infranet
Controllers Guide
Configuring Secure Access
Devices Guide
Configuring EX-series
Switches Guide
Configuring J-series Services
Routers and SRX-series
Services Gateways Guide
Provides procedures for basic tasks in the NSM user interface. It
also includes a brief overview of the NSM system and a description
of the GUI elements.
Provides complete syntax and description of the SOAP messaging
interface to NSM.
Provides the latest information about features, changes, known
problems, resolved problems, and system maximum values. If the
information in the Release Notesdiffers from the information found
in the documentation set, follow the Release Notes.
Release notes are included on the corresponding software CD and
are available on the Juniper Networks Website.
Provides details about configuring the device features for all
supported Infranet Controllers.
Provides details about configuring the device features for all
supported Secure Access Devices.
Provides details about configuring the device features for all
supported EX-series platforms .
Provides details about configuring the device features for all
supported J-series Services Routers and SRX-series Services
Gateways.
M-series and MX-series
Devices Guide
Requesting Technical Support
Technical productsupport is availablethrough theJuniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need post-sales technical support, you can access
our tools and resources online or open a case with JTAC.
•
JTAC policies—For a complete understanding of our JTAC procedures and policies,
review the JTAC User Guide located at
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
•
Download the latest versions of software and review release notes:
http://www.juniper.net/customers/csc/software/
•
Search technical bulletins for relevant hardware and software notifications:
https://www.juniper.net/alerts/
•
Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
About This Guide
•
Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/
To verifyservice entitlement byproduct serial number,use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
•
Use the Case Management tool in the CSC at http://www.juniper.net/cm/ .
•
Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
For international or direct-dial options in countries without toll-free numbers, see
Introduction to Network and Security Manager on page 3
•
Installing NSM on page 3
•
Role-Based Administration on page 4
Introduction to Network and Security Manager
Juniper Networks Network and Security Manager (NSM)gives you complete control over
your network. Using NSM, you can configure all your Juniper Networks devices from one
location, at one time.
NSM works with networks of all sizes and complexity. You can add a single device, or
create device templates tohelp you deploy multiple devices. You can create new policies,
or edit existing policies for security devices. The management system tracks and logs
each administrative change in real time, providing you with a complete administrative
record and helping you perform fault management.
Related TopicsInstalling NSM on page 3•
Installing NSM
NSM also simplifies control of your network with a straightforward user interface. Making
all changes to your devices from a single, easy-to-use interface can reduce deployment
costs, simplify network complexity, speed configuration, and minimize troubleshooting
time.
For more detailed information about NSM, including a technical overview, working in the
NSM user interface (UI), and new features in NSM 2010.3, see the section on getting
started with NSM in the Network and Security Manager Administration Guide.
• Role-Based Administration on page 4
• NSM and Device Management Overview on page 5
NSM is a software application that enables you to integrate and centralize management
of your JuniperNetworks environment. You needto install two main software components
to run NSM: the NSM management system and the NSM user interface (UI).
The overall process for installing NSM is as follows:
•
Management System Installation Process
•
User Interface Installation Process
Refer to the Network Security Manager Installation Guide for details on the steps to install
the NSM management system on a single server or on separate servers. It also includes
information on how to install and run the NSM user interface. The Network SecurityManager Installation Guide is intendedfor ITadministrators responsible for the installation
of or upgrade to NSM.
Related TopicsIntroduction to Network and Security Manager on page 3•
• Role-Based Administration on page 4
• NSM and Device Management Overview on page 5
Role-Based Administration
The NSM role-based administration (RBA) feature enables you to define strategic roles
for your administrators, delegate management tasks, and enhance existing permission
structures using task-based functions.
Use NSM to create a secure environment that reflects your current administrator roles
and responsibilities. By specifying the exact tasks your NSM administrators can perform
within a domain, you minimize the probability oferrors and security violations and enable
a clear audit trail for every management event.
For moredetailedinformation about role-based administration, including using role-based
administration more effectively and configuring role-based administration, see
“Configuring Role-Based Administration” in the Network and Security ManagerAdministration Guide.
Related Topics• Introduction to Network and Security Manager on page 3
NSM Services Supported for M-series and MX-series Devices on page 10
•
How NSM Works with the CLI and Distributed Data Collection on page 11
•
Device Schemas on page 12
•
Communication Between a Device and NSM on page 13
NSM and Device Management Overview
NSM is the Juniper Networks network management tool that allows distributed
administration of network appliances like the M-series and MX-series routers. You can
use the NSM application to centralize status monitoring, logging, and reporting, and to
administer device configurations. The term device is used in NSM to describe a router or
platform.
Related TopicsUnderstanding the CLI and NSM on page 6•
With NSM you can manage andadminister a device from a single management interface.
In addition,NSM letsyou manage most of the parameters thatyou canconfigure through
the command-line interface (CLI). Although the configuration screens rendered in NSM
look different, the top-level configuration elements essentiallycorrespond to commands
in the CLI.
NSM incorporates a broad configuration management framework that allows
comanagement using other methods. To manage the device configuration, you can also
use the XML files import and export feature, or you can manage from the device’s admin
console.
• Comparing the CLI To the NSM UI on page 7
• NSM Services Supported for M-series and MX-series Devices on page 10
• How NSM Works with the CLI and Distributed Data Collection on page 11
• Communication Between a Device and NSM on page 13
Understanding the CLI and NSM
M-series and MX-series devices are routers that have the JUNOS software installed as
the operating system. With the JUNOS software you use the command-line interface
(CLI) to access an individual router (which is called a device in NSM)—whether from the
consoleor througha network connection. The CLI isa JUNOSsoftware-specific command
shell that runs on top of a UNIX-based operating system kernel. The CLI is a
straightforward command interface you can use to monitor and configure a router. You
type commands on a single line, and the commands are executed when you press the
Enter key. For more information on the CLI, see the JUNOS CLI User Guide.
Network and Security Manager (NSM) is a software application that centralizes control
and management of your Juniper Networks devices. NSM is a three-tier management
system made up of the following:
•
A user interface (UI)
Related TopicsNSM and Device Management Overview on page 5•
•
Management system
•
Managed devices
The devices process your network traffic and arethe enforcement points that implement
your policies. The UI and management system tiers are software-based so you can deploy
them quickly and easily. Because the management system uses internal databases for
storage and authentication, you do not need LDAP or an external database. For more
information about NSM architecture, see the technical overview in the Network SecurityManager Administration Guide.
With NSM you can manage most of the parameters that you can configure through the
CLI. Although the configuration screens rendered in NSM look different, the top-level
configuration elements essentially correspond to commands in the CLI.
Typically, M-series and MX-series devices are managed individually using the CLI. The
advantage of using NSM is that you can centralize status monitoring and administration
of the configurations of a network of M-series and MX-series devices.
• Comparing the CLI To the NSM UI on page 7
• NSM Services Supported for M-series and MX-series Devices on page 10
• How NSM Works with the CLI and Distributed Data Collection on page 11
• Device Schemas on page 12
• Communication Between a Device and NSM on page 13
Because NSM is a UI and the CLI is a command-line interface, the way you access
configuration, monitoring, and management information is different in each interface.
The CLI has two modes: operational mode and configuration mode.
•
Operational mode—This mode displays the current router status. In operational mode,
you enter commands to monitor and troubleshoot the software, network connectivity,
and router.
•
Configuration mode—A router configuration is stored as a hierarchy of statements. In
configuration mode, you enter these statements to define all properties of the JUNOS
software, including interfaces, general routing information, routing protocols, user
access, and several system hardware properties.
The following sample output shows the operational mode commands available at the
top level of the CLI operational mode:
user@host> ?
Possible completions:
clear Clear information in the system
configure Manipulate software configuration information
file Perform file operations
help Provide help information
monitor Show real-time debugging information
mtrace Trace multicast path from source to receiver
op Invoke an operation script
ping Ping remote target
quit Exit the management session
request Make system-level requests
restart Restart software process
set Set CLI properties, date/time, craft interface message
show Show system information
ssh Start secure shell on another host
start Start shell
telnet Telnet to another host
test Perform diagnostic debugging
traceroute Trace route to remote host
Chapter 2: Understanding the JUNOS CLI and NSM
The following sample output shows the protocols configuration of an M-series device:
For moreinformation about operational and configurationmode, see the JUNOS CLI User
Guide.
In contrast, the NSM UI displaysa set of menus, toolbaricons atthe top of the UI window,
and a navigation tree that includes an Investigate panel, a Configure panel, and an
Administer panel. For some components, right-click menus are available to perform
tasks.
Figure 1 on page 8 shows the NSM UI with the Configure navigation tree expanded and
the maindisplay area containing the services available from the Configure panel. Different
services display when you select the Investigate or Administer panels.
Menu bar—Contains clickable commands. You can access many menu bar commands
using keyboard shortcuts. For a complete list of keyboards shortcuts, see the Networkand Security Manager Online Help.
•
Toolbar—Contains buttons for common tasks. The buttons displayed in the toolbar
are determined by the selected module.
•
Domain menu—Contains a pull-down menu above the navigation tree where domains
and subdomains are selected. The domains and subdomains displayed are those to
which the current user has access.
•
Navigation Tree—The navigation tree displays the 11 NSM modules in the left pane of
the NSM window.
•
Investigate panel—Provides NSM modules with tree structures for monitoring your
network.
•
Configure panel—Provides NSM modules with tree structures for configuring devices,
policies, virtual private networks (VPNs), and other objects.
•
Administer panel—Provides NSM modules with tree structures for managing the NSM
servers, ongoing jobs, and other actions.
Related TopicsNSM and Device Management Overview on page 5•
•
Main display area—Displays the content for the currently selected module or module
contents.
•
Common tasks pane—Provides links to commonly accessed tasks throughout the UI.
These common tasks change depending on what tasks are often selected in the UI.
•
Status bar—Displays additional information for a selected module.
For details about the Investigate, Configure, and Administer panels, see “NSM Modules"
in the Network Security Manager Administration Guide.
• Understanding the CLI and NSM on page 6
• NSM Services Supported for M-series and MX-series Devices on page 10
• How NSM Works with the CLI and Distributed Data Collection on page 11
• Device Schemas on page 12
• Communication Between a Device and NSM on page 13
NSM Services Supported for M-series and MX-series Devices
NSM supports the following services for the M-series and MX-series devices:
•
Device management—Enables addition of new devices, editingand deletion of existing
devices, software version update, reconfiguration of existing devices, activation of
modeled devices, and master Routing Engine switchover with synchronized commits.
In addition, Return Merchandise Authorization (RMA) updates enable failed device
replacement without a serial number or connection statistics.
•
Device discovery—Uses sets of rules tofind, add, and import multipledevices into NSM.
In addition, configure and run rules to search a network and find devices in a specified
subnet, or within a specified range of IP addresses. M-series and MX-series devices
must be configured with static IP addresses to be found by device discovery rules.
•
Topology management—Provides discoveryand management ofthe physical topology
of a network of devices connected to a Juniper Networks EX-series switch. These
include networking devices such as the J-series, M-series, MX-series and EX-series as
well as ScreenOS and Intrusion Detection and Prevention (IDP) devices, IP phones,
desktops, printers, and servers. The Topology Manager also provides details about
connections between a device and the EX-series switch.
Related TopicsNSM and Device Management Overview on page 5•
•
Inventory and license management—Displays device inventory and licensing details.
In adual RoutingEngine system, the inventory data is collected from the master Routing
Engine.
•
Upgrading software for single and dual Routing Engines.
•
Configurationmanagement—Enables in-device configurationand editing,configuration
groups, and template configuration.
•
Status monitoring—Displays a list of all managed devices, including status, name,
domain, OS version, synchronization status, connection details, and current alarms.
•
Job management—Displays details of the update process in a dedicated information
window and includes the update’s success or failure and the errors involved in a failed
update.
Below is a summary of theservices that are not supportedfor theM-series and MX-series
devices:
•
Adding, deleting, or editing licensing information, (though licenses can be viewed).
•
Downgrading software.
•
Configuration of cluster objects, policy manager, VPN manager, and shared objects.
•
JUNOS Redundancy Protocol (JSRP), VPN, and IDP cluster monitor.
• How NSM Works with the CLI and Distributed Data Collection on page 11
• Device Schemas on page 12
• Communication Between a Device and NSM on page 13
How NSM Works with the CLI and Distributed Data Collection
Before we can discuss how NSM works with the CLI, the following terms need to be
defined:
•
ADM (Abstract Data Model)—The Abstract Data Model is an XML file that contains all
the configuration information for a domain.
•
configlet—A configlet is a small, static configuration file that contains information on
how a device can connect to NSM.
•
Device Server—The Device Server is the component of the NSM management system
that handles communication between the GUI Server and the device, collects data
from the managed devices on your network, formats configuration information sent
to your managed device, and consolidates log and event data.
•
DM (Data Model)—A Data Model is an XML file that contains configuration data for
an individual device. The DM is stored in the Device Server; when you create, update,
or import a device, the GUI Server edits the Abstract Data Model (ADM) to reflect the
changes, then translates that information to the DM
•
GUI Server—The GUI Server manages the system resources and data that drives NSM
functionality. The GUI Server contains the NSM databases and centralizes information
for devices and their configurations, attack and server objects, and policies.
NSM andthe CLIcommunicatethrough theGUI andDevice Servers that translate objects
and object attributes in both directions. Device configuration information is translated
into Data Model (DM) objects or Abstract Data Model (ADM) object attributes, and
conversely DM objects and ADM object attributes are translated into XML configlets and
documents.
NSM uses a distributed data collection system. Each device is described by a unique DM.
The DM is stored in the Device Server which communicates with the GUI Server and the
device.
When you create, update, or import a device into NSM, the GUI Server edits the ADM to
reflect the changes, then translates that information to the DM. The ADM contains
configuration data for all objects in a specific domain. When you use the UI to interface
with your managed devices, the ADM and DMs work together.
When you update a device configuration, the GUI Server translates the objects and
object attributes in the ADM domain into device configuration information in a DM. For
DMI based devices which include the M-series and MX-series, the Device Server converts
the DM into an XML configlet and sends the configlet through NetConf protocol to the
device.
Related TopicsNSM and Device Management Overview on page 5•
Device Schemas
•
When you import a device configuration, the device sends the configuration through
the NetConf protocol as an XML document to the Device Server, which translates the
XML document into a DM with device configuration information. The GUI Server then
translates the device configuration in the DM into objects and object attributes in the
ADM, and uses the ADM to display current information in the UI.
For more details on the ADM and DMs, see “Managing Devices” in the Network SecurityManager Administration Guide.
The management system also provides an application programming interface (API) for
integrating NSM into larger enterprise business systems. This NSM API provides an
alternative interface to that provided by the UI. For details, see the Network and SecurityManager API Guide.
• Understanding the CLI and NSM on page 6
• Comparing the CLI To the NSM UI on page 7
• NSM Services Supported for M-series and MX-series Devices on page 10
• Device Schemas on page 12
• Communication Between a Device and NSM on page 13
The structure of the ADM and the DMs is defined by a DM schema, which lists all the
possible fields and attributes for a type of object or device. The DM schema reads from
a capability file, which lists the fields and attributes that a specific operating system
version supports, to determine the supported features for the operating system version
that is running on the managed devices. NSM uses capability files to enable JUNOS
software upgrades without changing the device configuration in NSM.
The M-series and MX-series device families are described by schemasthat are maintained
on a schema repository owned by Juniper Networks. These schemas can be added
dynamically to NSM.
Related TopicsNSM and Device Management Overview on page 5•
• Understanding the CLI and NSM on page 6
• Comparing the CLI To the NSM UI on page 7
• NSM Services Supported for M-series and MX-series Devices on page 10
• How NSM Works with the CLI and Distributed Data Collection on page 11
• Communication Between a Device and NSM on page 13
Communication Between a Device and NSM
Chapter 2: Understanding the JUNOS CLI and NSM
The M-series and MX-series devices and the NSM application communicate through the
Device Management Interface (DMI). DMI is a collection of schema-driven protocols that
run on a common transport (TCP). DMI is designed to work with routers running the
JUNOS software to makedevice management consistent across alladministrativerealms.
The DMI protocols that are supported include NetConf (for inventory management,
XML-based configuration, text-basedconfiguration,alarm monitoring,and device-specific
commands), structured syslog, and threat flow for network profiling. DMI supports
third-party network management systems that incorporate the DMI standard; however,
only one DMI-based agent per device is supported.
The configuration of the M-series and MX-series device is represented as a hierarchical
tree of configuration items. This structure is expressed in XML that can be manipulated
with NetConf. NetConf is a network management protocol that uses XML. DMI uses
NetConf’s generic configuration management capability and applies it to allow remote
configuration of the device.
The schema repository enables access to XSD and XML files defined for each device,
model, and software version.
Related Topics• NSM and Device Management Overview on page 5
• Understanding the CLI and NSM on page 6
• Comparing the CLI To the NSM UI on page 7
• NSM Services Supported for M-series and MX-series Devices on page 10
• How NSM Works with the CLI and Distributed Data Collection on page 11
The network statusof yourdevice influences the preliminary configurationrequired before
you can addthe device to NSMand themethod you useto add the device to NSM. Devices
can be deployed in your network or undeployed. Deployed devices can be configured
with a static or dynamic IP address, which influences the method you use to add them
to NSM. Also, undeployed devices are treated differently from deployed devices.
•
Deployed devices—Deployed devices are the devices you are currently using in your
existing network. These devices have already been configured with a static or dynamic
IP address andother basicinformation. Youcan import a devicewith a static or dynamic
IP address to NSM, so long as it has the following enabled:
•
The management interface (fxp0) with the IP address of the device and a user with
full administrative privileges for the NSM administrator.
•
A physical connection to your network with access to network resources.
•
Connectivity to the NSM device server, which can be with a static IP address.
•
Telnet or SSHv2, and NETCONF protocol over SSH.
The NSM process of importing a deployed device differs depending on whether your
device is configuredwith a static ordynamic IP address. For information aboutimporting
a device with astatic IPaddress or about importinga devicewith adynamic IP address,
see the Network Security Manager Administration Guide.
NOTE: Toimport device configurations, the connection between NSM and the managed
device must be at least 28.8 Kbps. For details on installing NSM on your network, refer
to the Network and Security Manager Installation Guide.
•
Undeployed devices—Undeployed devices are devices that you are not currently using
in your network and, typically, for which you do not have IP addresses, zones, or other
basic network information. For undeployed devices, you can model a new device
configuration and later install that configuration on the device. For more information
on addingundeployeddevices, see “Modelinga Device”in theNetwork Security ManagerAdministration Guide.
Related TopicsM-series and MX-series Devices Supported by NSM on page 15•
• Configuring a Deployed M-series or MX-series Device for Importing to NSM on page 16
Configuring a Deployed M-series or MX-series Device for Importing to NSM
A deployed device is a device you are currently using in your network. Before you can add
a deployed device to NSM, you must configure the following parameters on the device,
regardless of the static or dynamic nature of the IP address:
Chapter 3: Before You Begin Adding M-series and MX-series Devices
•
The management interface (fxp0) with the IP address of the device
•
A user with full administrative privileges for the NSM administrator
•
A physical connection to your network with access to network resources
•
Connectivity to the NSM device server, which can be with a static IP address
•
Telnet or SSHv2, and NETCONF protocol over SSH
To configure these parameters, perform the following tasks:
•
Configure an IP Address and a User with Full Administrative Privileges for the
Device on page 17
•
Check Network Connectivity on page 17
•
Check Connectivity to the NSM Server on page 17
•
Configure a Static Route to the NSM Server on page 18
•
Establish a Telnet or an SSHv2, and a NETCONF protocol over SSH Connection to the
NSM Server on page 19
Configure an IP Address and a User with Full Administrative Privileges for the Device
PurposeBefore you canadd an M-series or MX-seriesdevice to NSM, you must have an IP address
configured on the management interface (fxp0) and a user with full administrative
privileges for the NSM administrator.
ActionGenerally when you install the JUNOS software, you configure the router from scratch
and at that point you configure the management interface (fxp0) with the IP address
and a user with full administrative privileges.
For information on configuring the router from scratch, see the JUNOS System BasicsConfiguration Guide.
For step-by-step instructions on reconfiguring names, addresses, and the root password
after reinstalling the JUNOS software, see “Configure Names and Addresses” and “Set
the Root Password.”
Check Network Connectivity
PurposeEstablish that the M-series or MX-series device has a connection to your network.
ActionTo check that the device has a connection to your network, log on to the M-series or
MX-series device and issue a ping command to a system on your network:
root@> ping address
If there is no response, verify that there is a route to the address using the show route
command. If the address is outside your fxp0 subnet, add a static route.
Check Connectivity to the NSM Server
PurposeEstablish that the M-series or MX-series device has a connection to the NSM server.
ActionTo check that the device has a connection to the NSM server, log on to the M-series or
MX-series device and issue a ping command to the IP address of the NSM server:
root@> ping address
If there is no response, verify that there is a route to the address using the show route
command.If the address isoutside your fxp0 subnet, add a staticroute to theNSM server.
Configure a Static Route to the NSM Server
PurposeWhen your M-series or MX-series device and the NSM server are in different subnets, you
can install a static route on the device to connect to the NSM server. The static route is
installed in the routing table only when the route is active; that is, the list of next-hop
routersconfigured for that route contains at least one next hop on an operational interface.
ActionTo configure a static route, follow these steps:
1.Log on to the M-series or MX-series device and, in configuration mode, go to the
following hierarchy level:
[edit]
user@host# edit routing-options
2.Configure a static route to the NSM server with the retain option so that the static
route remains in the forwarding table when the routing protocol process shuts down
normally:
[edit routing-options]
user@host# set static route destination-prefix next-hop address retain
3.Configure the no-readvertiseoption so that the route is not eligiblefor readvertisement
by dynamic routing protocols:
[edit routing-options]
user@host# set static route destination-prefix next-hop address no-readvertise
4.Verify the configuration:
user@host# show
5.Commit the configuration:
user@host# commit
6.Verify the connection to the NSM server:
user@host# run ping destination
Sample Outputuser@host> edit
Entering configuration mode
[edit]
user@host# edit routing-options
[edit routing-options]
user@host# set static route 192.193.60.181/32 next-hop 192.193.76.254
[edit routing-options]
user@host# set static route 192.193.60.181/32 retain
[edit routing-options]
user@host# run ping 192.193.60.181
PING 192.193.60.181 (192.193.60.181): 56 data bytes
64 bytes from 192.193.60.181: icmp_seq=0 ttl=64 time=23.050 ms
64 bytes from 192.193.60.181: icmp_seq=1 ttl=64 time=18.129 ms
64 bytes from 192.193.60.181: icmp_seq=2 ttl=64 time=0.304 ms
^C
--- 192.193.60.181 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.304/13.828/23.050/9.771 ms
MeaningThe sample output shows that a static route (192.193.60.181/32) to the NSM server is
configured and committed, and that there is a connection between the router and the
server because the ping command shows that three packets were transmitted and
received.
Establish a Telnet or an SSHv2, and a NETCONF protocol over SSH Connection to the NSM
Server
To configure an M-series or MX-series device before adding it to NSM, take the following
steps:
1.Log on to the M-series or MX-series device.
2.In configuration mode, go to the following hierarchy level:
[edit system services]
3.At the [edit system services] hierarchy level, enter the following commands:
Supported Add Device Workflows for M-series and MX-series Devices on page 24
•
Importing Devices Overview on page 25
•
Modeling Devices Overview on page 26
•
Adding Multiple Devices Using Automatic Discovery (JUNOS Software Devices
Only) on page 27
•
Adding Device Groups Overview on page 27
About Device Creation
Before Network and Security Manager (NSM) can manage devices, you must first add
those devices to the management system using the NSM user interface (UI). To add a
device, you create an object in the UI that represents the physical device, and then create
a connection between the UI object and the physical device so that their information is
linked. When you make a change to the UI device object, you can push that information
to the real device so the two remain synchronized. You can add a single device at a time
or add multiple devices all at once.
NOTE: The connection between a managed device and the NSM Device Server must
be at least 28.8 Kbps.
How you add your devices to the management system depends on the network status
of the device. You can import deployed devices, or you can model devices that have not
yet been deployed:
•
Import deployed devices—Deployed devices are the devices you are currently using in
your existing network. These devices have already been configured with a static or
dynamic IP address and other basic information. For deployed devices, you can import
the existing device configuration information into NSM.
NOTE: Toimport device configurations, the connection between NSM and the managed
device must be at least 28.8 Kbps. For details on installing NSM on your network, refer
to the Network and Security Manager Installation Guide.
•
Model undeployed devices—Undeployed devices are devices thatyou are not currently
using in your network and, typically for which, you do not have IP addresses, zones, or
other basic network information. For undeployed devices, you can model a new device
configuration and later install that configuration on the device.
To help you add a device, the UI contains an Add Device wizard that walks you through
each step of the device creation process. The Add Device wizard prompts you to first
choose a workflow from the given options. Device is reachable is the default option. The
wizard then prompts you for specific device information, such as the device platform
name, OS name and version, IP address, and device administrator name, and then uses
that information todetect thedevice. You can then choose to modify the displayedname
of the device and assign a color to the device. If the host name is not unique within NSM
or is undetected, the Add Device wizard generates a validation error, forcing you to add
a valid device name in order to proceed with adding the physical device to the Device
Server.
After the physical device connects, it is considered to be a managed device, meaning it
is now under the control of NSM.
For more detailed information about verifying and managing a device, see “About Device
Creation” in the Network and Security Manager Administration Guide.
Related TopicsSupported Add Device Workflows for M-series and MX-series Devices on page 24•
NSM can import device configurations from M-series and MX-series devices running
JUNOS 9.3 or later.
Chapter 4: Adding M-series and MX-series Devices Overview
When importing from a device, the management system connects to the device and
imports Data Model (DM) information that contains details of the device configuration.
The connection is secured using Secure Server Protocol (SSP), a proprietary encryption
method; an always-on connection exists between the management system and the
device.
For details about adding multiple devices at one time, see the Network and SecurityManager Administration Guide.
RequirementsTo import a single device, you must have available the following requirements:
• A management interface (fxp0) with the IP address of the device
• A user with full administrative privileges for the NSM administrator
• Device connection information (IP address, connection method) and the device
administrator's name and password
NOTE: All passwords handled by NSM are case-sensitive.
• A physical connection to your network with access to network resources
• Connectivity to the NSM Device Server, which can be with a static IP address
• A Telnet or an SSHv2, and a NETCONF protocol over SSH connection
NOTE: After importing a device configuration, log entries from that device begin to
appear in the Log Viewer. However,until you update the device from NSM, the following
log fields display 0 (or unknown):
• domain
• rulebase
• policy
• rule number
• source zone
• destination zone
After you update the imported device configuration using NSM, the appropriate values
are displayed for log entries from the device.
When you import a device configuration,the Log Viewer displaysthe appropriate values
for the device's log entries. This feature eliminates the need to update the device after
importing it.
For moredetailedinformation about adding and importing devices with staticand dynamic
IP addresses and verifying imported device configurations, see “Adding Devices” in the
Network and Security Manager Administration Guide.
Related TopicsAbout Device Creation on page 23•
• Supported Add Device Workflows for M-series and MX-series Devices on page 24
For an undeployed M-series or MX-series device, you can create a device configuration
in NSM, and then install that device configuration on the physical device.
Adding a single undeployed device to NSM is a four-stage process:
Adding Multiple Devices Using Automatic Discovery (JUNOS Software Devices Only)
You can use automatic discovery to add and import multiple JUNOS software devices
into NSM. You do so by configuring and running discovery rules. For a JUNOS software
device to be discovered by this mechanism, it mustbe configured with astatic IPaddress.
By configuring and running a discovery rule, you can search a network to discover devices
in a specified subnet or within a range of IP addresses. Authentication of the devices is
through administrator login SSHv2 credentials and SNMP community settings, which
you also configure as part of the rule. Devices that match the rules for discovery also
present an SSH key for your verification before the device is added to NSM.
For more detailed information and steps about adding multiple M-series and MX-series
devices using automatic discovery, see “Adding a Device Discovery Rule” and “Running
a Device Discovery Rule” in the Network and Security Manager Administration Guide.
Related TopicsAbout Device Creation on page 23•
• Supported Add Device Workflows for M-series and MX-series Devices on page 24
• Importing Devices Overview on page 25
• Modeling Devices Overview on page 26
• Adding Device Groups Overview on page 27
Adding Device Groups Overview
You can create groups of devices to manage multiple devices at one time. Use device
groups to organize your managed devices, making it easier for you to configure and
manage devices within a domain. You can group devicesby type (such as all the M-series
in a domain), by physical location (such as all the devices in the San Jose office), or
logically (such as all the devices in sales offices throughout western Europe).
Use the groups to:
•
Deploy new or updated device configurations to the entire device group.
•
Deploy new or updated policies to the entire device group.
The devices that you add to a device group must exist; that is, you must have previously
added or modeled the devices in the domain. You can group devices before configuring
them. You can add a device to more than one device group. You can also add a device
group to another device group.
NOTE: You cannot apply a template to a device group. You must apply templates to
individual devices in a device group. If you need to apply the same set of templates to
multiple devices, you can create a single template that includes all the templates that
are to be applied to a device, and then apply the combined template to each device.
For an example of creating a device group, see “Adding Device Groups” in the Network
and Security Manager Administration Guide.
• Supported Add Device Workflows for M-series and MX-series Devices on page 24
About Updating M-series and MX-series Devices on page 29
•
How the Update Process Works on page 30
•
Job Manager on page 31
•
Tracking Updated Devices Using Job Manager on page 32
•
Reviewing Job Information Displayed in Job Manager on page 33
•
Device States Displayed in Job Manager During Update on page 34
•
Understanding Updating Errors Displayed in the Job Manager on page 35
About Updating M-series and MX-series Devices
When you update a managed device, you modify the running device configuration (the
configuration currently installed on the physical device) with the modeled device
configuration (the configuration currently modeled in Network and Security Manager
(NSM).
You can update a single device, multiple devices, or device groups simultaneously. For
example, if you have created a device group that includes only M-series devices, you can
update the entire device group in a single update procedure. During the update, NSM
displaysthe progressof the update on each individual device so you can see exactly what
is happening. Simultaneous updating also reduces downtime to unaffected devices and
areas of your network.
Updating a device is a three-step process.
1.Ensure that you have configured the device correctly, created and assigned a policy
to the device,and establisheda connection between the device and the management
server.
2.From the Device Managerlaunchpad, select Update Device. The launchpad displays
the Update Device(s) dialog box.
All connected and managed devices appear in the device list. Modeled devices and
devices awaiting import for the first time do not appear.
3.Select the devices or device groups you want to update and click Apply Changes.
NSM updates the selected devices or device groups with the modeled configuration.
NSM uses centralized control and tracking to indicate when you need to update a device,
and to follow the progress of the device configuration you are updating. Before updating
your managed devices, you can use other NSM modules and tools to identify devices
that need to be updated, validate their modeled configurations, and preview how those
devices accept the new configuration. After updating, you can use the same tools to
verify a successful update. These tools include:
•
Audit Log Viewer—This NSM module records changes made to a device configuration.
The audit log entry also identifies the administrator who performed the change, shows
when the change was updated on the device, and provides a history of change details.
•
ConfigurationSummaries—These tools provide apreview of the modeled configuration,
enabling you to compare it with the configuration that is running on the device. Use
configuration summaries to ensure the modeled configuration is consistent with what
you want to update on the device.
•
Job Manager—This NSM module tracks the status of running and completed update
processes. The Job Manager displays details of the update process in a dedicated
information window and includes the update’s success or failure and errors involved
in a failed update.
For more information about updating devices, including knowing when to update, using
preview tools, performingupdates,tracking updates and rebooting devices, see“Updating
Devices” in the Network and Security Manager Administration Guide.
Related TopicsHow the Update Process Works on page 30•
• Job Manager on page 31
• Tracking Updated Devices Using Job Manager on page 32
• Reviewing Job Information Displayed in Job Manager on page 33
• Device States Displayed in Job Manager During Update on page 34
• Understanding Updating Errors Displayed in the Job Manager on page 35
How the Update Process Works
After you have successfully added the device to NSM, reviewed the device configuration,
updated the device, and have the managed device functioning normally, an event might
occur on the managed device that requires a change to the device configuration. For
example, malicious traffic might have entered your network, requiring you to update the
device to detect and prevent that attack.
Chapter 5: Updating M-series and MX-series Devices Overview
1.Using the NSM monitoring tools, you learn of the attack and locate the cause of the
event. Using NSM modules such as the Realtime Monitor and Log Viewer, you
determine the exact attack that penetrated the device. From the Report Manager,
you also determine what rule in the security policy was ineffective in blocking the
attack.
2.You update the modeled device configuration, editing the configuration to detect
and prevent the attack from entering your network again.
3.Before updating the running configuration, you review the modeled device
configuration. Using a delta configuration summary, compare the modeled
configurationwith therunning configuration on the device toconfirm thedifferences.
Fine-tune the modeled configuration, if needed.
4.When you are confident that the modeled configuration is valid, update the device.
NSM updates the running configuration with only the new changes (delta). During
the update, you track the update progressusing JobManager in realtime andobserve
the transfer of the configuration from NSM to the device.
If the update is unsuccessful, use the information in the Job information dialog box
to correct the problems in the modeled configuration.
Related TopicsAbout Updating M-series and MX-series Devices on page 29•
Job Manager
5.After updating, run a second delta configuration summary to identify any remaining
differences between the modeled configuration and the running configuration on
the device. When the delta configuration summary reveals no differences between
the new configuration and the old configuration on the device, you have successfully
updated the running configuration.
• Job Manager on page 31
• Tracking Updated Devices Using Job Manager on page 32
• Reviewing Job Information Displayed in Job Manager on page 33
• Device States Displayed in Job Manager During Update on page 34
• Understanding Updating Errors Displayed in the Job Manager on page 35
You canview theprogress of communication to and fromyour devices inthe JobManager,
that is located in the Administer panel. NSM sends commands to managed devices at
your request, typically to import, update or reboot devices, and view configuration and
delta configuration summaries. When you send a command to a device or group of
devices, NSM creates a job for that command and displays information about that job
in the Job Manager module.
Job Manager tracks the progress of the command as it travels to the device and back to
the management system. Each job contains:
Related TopicsAbout Updating M-series and MX-series Devices on page 29•
•
Name of the command
•
Date and time the command was sent
•
Completion status for each device that received the command
•
Detailed description of command progress
•
Command output, such as a configuration list or command-line interface (CLI) changes
on the device
NOTE: Job Manager configurationsummaries and job information details do not display
passwordsin the list of CLI commands for administratorsthat do not have the assigned
activity “View Device Passwords.” By default, only the super administrator has this
assigned activity.
• How the Update Process Works on page 30
• Tracking Updated Devices Using Job Manager on page 32
• Reviewing Job Information Displayed in Job Manager on page 33
• Device States Displayed in Job Manager During Update on page 34
• Understanding Updating Errors Displayed in the Job Manager on page 35
Tracking Updated Devices Using Job Manager
Use JobManager to track device updates in real time. You canview the status ofa running
update and the status of completed updates in the Job Manager module.
When you send a command to a device or group ofdevices using NSM, the management
system creates a job for that command and displays information about that job in the
Job Information dialog box. The command you send is called a directive.
Job Manager includes the following utilities and information:
•
View Controls—Use View controls to set the information level you want displayed in
Job Manager:
•
Expand All displays all devices associated with a directive type.
•
Collapse All displays the directive type.
•
Job Type (Directive) List—Displays the job type (directives) and associated timestamp
completionstatus information. All currentand completed jobsappear,including device
updates. However, if you have not yet performed an update using NSM, the Job List
does not display an Update Configuration directive.
Chapter 5: Updating M-series and MX-series Devices Overview
•
Notification Controls—Enables you to manually view job completion status.
•
Job Information—Enables you to view job information, including errors, job completion
status, job state, automatic job completion notification setting, and start time of job.
Related TopicsAbout Updating M-series and MX-series Devices on page 29•
• How the Update Process Works on page 30
• Job Manager on page 31
• Reviewing Job Information Displayed in Job Manager on page 33
• Device States Displayed in Job Manager During Update on page 34
• Understanding Updating Errors Displayed in the Job Manager on page 35
Reviewing Job Information Displayed in Job Manager
The Job Information dialog box displays the changing device states as the directive is
executed. Device state changes, error messages, and warning messages are displayed
in real time. A sample Job Information dialog box is shown in Figure 3 on page 33.
Figure 3: Job Information Dialog Box
Job Manager tracks the overall progress of one or more jobs executed on a single device.
For multiple device updates, Job Manager tracks the progress of each job on each device
in addition to the overall progress for all devices. To view the job status for an individual
device (including error messages and percent complete), select the device in the Percent
Complete pane; the status appears in the Output pane.
Job Type—The type of task being tracked. Job types include Update Device, Reboot
Device, and Config Summary. Job type is also known as a directive.
•
Timestamp—The time at which NSM began executing the directive.
•
Admin Name—The name of the administrator logged into NSM.
•
Status—The current state of the job.
•
Completion—The number of jobs completed out of the total number of jobs.
•
Percent—The percentage oftotal jobssuccessfullyexecuted. When performing multiple
jobs on multiple devices, this field displays the percentage complete for each device.
When the job has completed, successfully or unsuccessfully, this field displays 100%.
•
Name—The name of the device on which the job is executed.
•
Description—The current state of the job.
•
Completion—The percentage of a job that has executed successfully.
•
Output—Displays the content of the update, including commands that have been
interpretedfrom the NSM data model into device-specific commands, errormessages,
and existing commands deleted from the device. The Output Display Region displays
all errors, warnings,device verification output, and devicestate information associated
with the job.
NOTE: If the Job Information dialog box might contain Chinese, Japanese, or Korean
characters, you must uncheck the Fixed Font box to display them.
NOTE: Job Manager configurationsummaries and job information details do not display
passwordsin the list of CLI commands for administratorsthat do not have the assigned
activity “View Device Passwords.” By default, only the super administrator has this
assigned activity.
Related TopicsAbout Updating M-series and MX-series Devices on page 29•
• How the Update Process Works on page 30
• Job Manager on page 31
• Tracking Updated Devices Using Job Manager on page 32
• Device States Displayed in Job Manager During Update on page 34
• Understanding Updating Errors Displayed in the Job Manager on page 35
Device States Displayed in Job Manager During Update
During an update, the managed device changes device state. You can view the current
device state in real time in the State Description field of the Job Information dialog box.
Table 6 on page 35 lists the states that a device can have.
Chapter 5: Updating M-series and MX-series Devices Overview
Table 6: Device States During Update
DescriptionDevice State
No update activity has occurred on the device.None
Related TopicsAbout Updating M-series and MX-series Devices on page 29•
Loading in Progress
Pending
Converting Data Model to
Device Data Model
Successful Completion
Failed
• How the Update Process Works on page 30
• Job Manager on page 31
• Tracking Updated Devices Using Job Manager on page 32
• Reviewing Job Information Displayed in Job Manager on page 33
• Understanding Updating Errors Displayed in the Job Manager on page 35
NSM is sending the update image to the flash memory of the
device.
Device is accepting the parameters from the update
configuration that has been sent to the device flash memory.
The parameters that have been set in the NSM configuration
are being changed to corresponding device-specific CLI
commands that execute on the device.
Device has successfully been updated with the modeled
configuration.
Device has not been successfully updated with the modeled
configuration. The Job Information dialog box displays error
messages and error codes.
Understanding Updating Errors Displayed in the Job Manager
When anupdate fails forany reason, Job Managerdisplays error codesand errormessages
that can help you identify and locate the problem. Typical errors include:
•
The modeled configuration contained invalid values that the device could not process.
•
During theupdate process, theconnection between the managed device andthe Device
Server was lost.
•
The modeled configuration caused the managed device to lose its connection to NSM.
•
An exclusive lock on the configuration prevented NSM from completing an update.
This error is specific to devices running the Device Management Interface (DMI), such
as the M-series and MX-series devices.
For these update errors, the Job Information dialog box displays the job status as “Failed.”
Figure 4 on page 36 shows that on December 4 a configuration update to an MX960
failed. The super user was locked out by the root user as indicated in the text of the error
that shows lock Failed and configuration database locked by: root. For an M-series or
MX-series device, NSM attempts to acquire an exclusive lock on the candidate
configurationso thatthe updatecan proceed. In this instance, the root user was updating
the configuration, probably from the CLI, preventing NSM from locking and successfully
updating the configuration.
Figure 4: Failed Update Job Information Dialog Box
In the Job Information dialog box, the update:
•
Successfully checked sanity
•
Unsuccessfully attempted to lock the configuration that was already locked by the
root user
At the end of the error message, there are some suggestions as to how to proceed. In
this particular case, the second solution, > request system logout pid xxxx, is the
appropriate action. From the CLI, the request system logout pid pid command can be
used to forcibly log out the root user. The root user is represented by pid pid, which
indicatesthe user session using thespecified managementprocess identifier (PID). After
the root user is locked out, you can try to update the configuration again. NSM should
lock the configuration and continue successfully.
Chapter 5: Updating M-series and MX-series Devices Overview
After a device is updated, you can run a delta configuration summary to determine any
remaining differences between the modeled configurationand the running configuration;
the output of this summary appears in the Job Information dialog box. For successful
updates, no discrepancies arefound or displayed. For failed updates, the Job Information
dialog box lists the remaining discrepancies.
You can also check the Connection Status and Configuration Status columns for the
device in the Realtime Monitor to determine whether the device is running. For more
information, see “About the Realtime Monitor.”
Related Topics• About Updating M-series and MX-series Devices on page 29
• How the Update Process Works on page 30
• Job Manager on page 31
• Tracking Updated Devices Using Job Manager on page 32
• Reviewing Job Information Displayed in Job Manager on page 33
• Device States Displayed in Job Manager During Update on page 34
Configuring M-series and MX-series
Devices Overview
•
About Device Configuration on page 41
•
M-series and MX-series Device Configuration Settings Supported in NSM on page 42
•
Configuring Device Features on page 44
•
Example: Configuration of Interfaces for MPLS in the CLI and NSM on page 45
About Device Configuration
This topic does not provide extensive details for configuring features on M-series and
MX-series devices in Network and Security Manager (NSM). For detailed information
about configuring specific features for M-series and MX-series devices, see the following
JUNOS software configuration guide:
•
JUNOS System Basics Configuration Guide for system, chassis, security, and access
parameters.
•
JUNOS Network Interfaces Configuration Guide for interface parameters.
•
JUNOS Policy Framework Configuration Guide for forwarding options and firewall
parameters.
•
JUNOS Configuration and Diagnostic Automation Guide for event options parameters.
•
JUNOS Network Management Configuration Guide for SNMP and accounting options
parameters.
•
JUNOS Routing Protocols Configuration Guide for routing options and protocols
parameters.
•
JUNOS VPNs Configuration Guide for policy options parameters.
•
JUNOS Class of Service Configuration Guide for class of service parameters.
•
JUNOS Software with Enhanced Services Security Configuration Guide for security
parameters.
•
JUNOS Services Interface Configuration Guide for service parameters.
For more information about editing device configurations in NSM, including using device
templates, using configuration groups, and using configuration groups with templates,
see “Configuring Devices” in the Network and Security Manager Administration Guide.
Related TopicsM-series and MX-series Device Configuration Settings Supported in NSM on page 42•
• Configuring Device Features on page 44
• Example: Configuration of Interfaces for MPLS in the CLI and NSM on page 45
M-series and MX-series Device Configuration Settings Supported in NSM
You can configure JUNOS software features in NSM. Although the configuration screens
rendered in NSM look different than the JUNOS command-line interface (CLI), the
top-level configuration elements mostly correspond to commands in the CLI.
NOTE: For detailed information about configuring specific features for M-series and
MX-series devices, see the appropriate JUNOS software configuration guide.
NOTE: Because the NSM device-side configurationguides are not updated on the same
release schedule as the JUNOS releases, consult the JUNOS Software Documentation
for information about configuration settings that might occur in NSM and not in the
device-side configuration guides or vice versa.
Table 7 on page 42 provides a general guideline of the CLI hierarchy levels that are
supported in the NSMconfigurationtree. Forthe exact parameters available,double-click
the device in the Device Manager and select the Configuration tab. The configuration
tree appears in the main display area with all parameters viewable or configurable from
NSM.
Table 7: The JUNOS Configuration Hierarchy and the NSM Configuration
Tree
Available in the NSM
Configuration TreeHierarchy Level
Related TopicsAbout Device Configuration on page 41•
When you use NSM to edit the software configuration on the device, you initially make
the changes to a device object that models the device in NSM. When you are satisfied
with your configuration changes, you use the Update Device directive to push the
configuration from the device object in NSM to the device itself. At that point, the edited
configuration becomes active.
NOTE: If you import an existing device configuration, NSM automatically imports all
objects defined in that configuration.
For more information about editing device configurations, using device templates, using
configuration groups, and using configuration groups with templates, see “Configuring
Devices” in the Network and Security Manager Administration Guide.
• Configuring Device Features on page 44
• Example: Configuration of Interfaces for MPLS in the CLI and NSM on page 45
Configuring Device Features
You can configure JUNOS software features in NSM. Although the configuration screens
rendered in NSM look different than the JUNOS command-line interface (CLI), the
top-level configuration elements mostly correspond to commands in the CLI.
NOTE: For detailed information about configuring specific features for M-series and
MX-series devices, see the appropriate JUNOS software configuration guide.
To configure a device that has been added, imported, or modeled in NSM:
1.In the navigation tree, select Device Manager > Devices.
2.Open the device configuration using one of the following methods:
•
Double-click the device object in the security device tree or the device list.
•
Select the device object and then click the Edit icon.
•
Right-click the device object and select Edit.
3.Select the Configuration tab.
The device configuration tree appears in the left pane.
4.In the device navigation tree, select a function heading to see device parameters,
and then select the configuration parameter you want to configure.
5.Make your changes to the device configuration, then choose one of the following:
•
•
Click OK to save your changes and close the device configuration.
Click Apply to save your changes and continue making changes.
Chapter 6: Configuring M-series and MX-series Devices Overview
•
Click Cancel to discard all changes and close the device configuration.
To reset a device feature to its default value, right-click on the feature name in the device
editor and select Revert to template/default value.
Related TopicsAbout Device Configuration on page 41•
• M-series and MX-series Device Configuration Settings Supported in NSM on page 42
• Example: Configuration of Interfaces for MPLS in the CLI and NSM on page 45
Example: Configuration of Interfaces for MPLS in the CLI and NSM
With NSM you can manage most of the parameters that you can configure through the
CLI. Although the configuration screens rendered in NSM look different, the top-level
configurationelements essentially correspond to commands inthe CLI. Youcan configure
an M-series or MX-series device using the CLI, then import the configuration into NSM to
create a template and apply it to multiple devices.
The following figures show the same configuration displayed in the CLI and the NSM UI.
Figure 5 on page 45 shows the CLI configuration of MPLS at the [edit protocols mpls]
hierarchy level, and Figure 6 on page 46 shows the same configuration in the NSM UI.
Figure 5 on page 45 shows output for the show command in configuration mode. At this
level, the show command typically displays the entire configuration for the device. For
the purpose of this illustration, all parts of the configuration not relevant to our example
were removed [...Output Truncated...]. The remaining output shows the protocols and
MPLS hierarchy levels. Included at the hierarchy level are three interfaces, two Fast
Ethernet interfaces (fe) and one Gigabit Ethernet interface (ge).
Figure 5: MPLS Configuration in the CLI
Figure 6 on page 46 shows the NSM UI with the same information as in the CLI example.
On the left, the Navigation tree is expanded at Protocols, and then further expanded at
MPLS, similar to the CLI hierarchy levels. Within MPLS, Interface is highlighted, indicating
that the information on the right relates to interfaces within MPLS. The information in
the NSM UI example is similar to the information in the CLI example though the
presentation is somewhat different.
In addition, Figure 6 on page 46 shows parts of the configuration tree that are grayed out,
indicating that those particular parameters are not supported for the M-series and
MX-series devices.
Related Topics• About Device Configuration on page 41
• M-series and MX-series Device Configuration Settings Supported in NSM on page 42
The address-assignment pool feature supports subscriber management functionality
by enablingyou to createaddress pools that canbe sharedby different clientapplications.
An address-assignment pool can support either IPv4 address or IPv6 addresses. You
cannot use the same pool for both types of address.
To configure address assignment pools in NSM:
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
3.Click the Configuration tab. In the configuration tree, expand Access.
4.Select Address Assignment.
5.Add or modify settings as specified in Table 8 on page 48.
Configure a static binding for
the specified client.
1.Click Host next to Inet.
2.Click Add new entry next to Host.
3.In the Name box, enter the name of the client.
4.In the Comment box, enter the comment.
5.In the Hardware Address box, enter the MAC address of the
client
6.In the IP Address box, enter the IP version 4 (IPv4) address.
Configure a named range of
IPv4 addresses or IPv6
prefixes, used within an
address-assignment pool.
1.Click Range next to Inet.
2.Click Add new entry next to Range.
3.In the Name box, enter the name assigned to the range of
IPv4 addresses or IPv6 prefixes.
4.In the Comment box, enter the comment.
5.In the Low box, enter the lower limit of an address range or
IPv6 prefix range.
6.In the High box, enter the upper limit of an address range or
IPv6 prefix range.
Related TopicsConfiguring Access Address Pools (NSM Procedure) on page 50•
• Configuring Access Group Profile (NSM Procedure) on page 51
Configuring Access Address Pools (NSM Procedure)
With an address pool, you configure an address or address range. When you define an
address pool for a client, the layer2 tunneling protocol network server (LNS) allocates
IP addresses for clients from an address pool.
To configure access address pools in NSM:
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
3.Click the Configuration tab. In the configuration tree, expand Access.
4.Select Address Pool.
5.Add or modify settings as specified in Table 9 on page 51.
8.From the Timeout list, select the amount of time that the
local router waits toreceive aresponse froma Radius server.
Range: 3 through 90
Default: 5
Related TopicsConfiguring the LDAP Options (NSM Procedure) on page 52•
Configuring Access Profiles for L2TP or PPP Parameters (NSM Procedure)
You can set up access profiles tovalidate Layer 2 Tunneling Protocol (L2TP) connections
and sessionrequests. You can configure multiple profiles.You canalso configure multiple
clients for each profile. See the following topics:
1. Configuring Access Profile (NSM Procedure) on page 55
2. Configuring Accounting Parameters for Access Profiles (NSM Procedure) on page 55
3. Configuring the Accounting Order (NSM Procedure) on page 56
4. Configuring the Authentication Order (NSM Procedure) on page 57
5. Configuring the Authorization Order (NSM Procedure) on page 57
6. Configuring the L2TP Client (NSM Procedure) on page 58
7. Configuring the Client Filter Name (NSM Procedure) on page 59
8. Configuring the LDAP Options (NSM Procedure) on page 60
9. Configuring the LDAP Server (NSM Procedure) on page 61
10. Configuring the Provisioning Order (NSM Procedure) on page 62
Configure RADIUS
accounting parameters and
enable RADIUS accounting
for an access profile.
1.Click Add new entry next to Profile.
2.Click Accounting next to profile.
3.In the Comment box, enter the comment.
4.Select theAccountingStop On Failurecheck box toconfigure
RADIUS accounting to send an Acct-Stop message when
client access fails AAA but the AAA server grants access.
5.Select the Accounting Stop On Access Deny check box to
configureRADIUS accounting to send anAcct-Stop message
when the AAA server denies a client access.
6.Select the Immediate Update check box to configure the
router to send an Acct-Update message to the RADIUS
accounting server on receipt of a response (for example, an
ACK or timeout) to the Acct-Start message.
7.From the Update Interval list, select the amount of time
between updates, in minutes.
Range: 10 through 1440 minutes
Default: no updates
8.From the Statistics list, select the time statistics for the
sessions being managed by AAA.
Configuring the Accounting Order (NSM Procedure)
Beginning with JUNOS Release 8.0, you can configure RADIUS accounting for an Layer
2 Tunneling Protocol (L2TP) profile. With RADIUS accounting enabled, Juniper Networks
routers, acting as RADIUS clients, can notify the RADIUS server about user activities such
as software logins, configuration changes, and interactive commands. When you enable
RADIUS accounting for an L2TP profile, it applies to all the clients within that profile. You
must enable RADIUS accounting on at least one LT2P profile for the RADIUS
authentication server to send accounting stop and start messages.
To configure accounting order in NSM:
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
3.Click the Configuration tab. In the configuration tree, expand Access.
4.Select Profile.
5.Add or modify settings as specified in Table 15 on page 57.
4.In the New accounting-order window, select radius to use
RADIUS accounting method.
Configuring the Authentication Order (NSM Procedure)
You can configure the order in which the JUNOS Software tries different authentication
methods when authenticating peers. For each access attempt, the software tries the
authentication methods in order, from first to last.
To configure authentication order in NSM:
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
Chapter 7: Configuring Access
3.Click the Configuration tab. In the configuration tree, expand Access.
4.Select Profile.
5.Add or modify settings as specified in Table 16 on page 57.
6.Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Table 16: Authentication Order Configuration Details
Your ActionTask
Configurethe authentication
order.
1.Click Add new entry next to Profile.
2.Click Authentication Order next to Profile.
3.Click Add new entry next to Accounting Order.
4.In the New authentication-order window, select the order in
which the JUNOS Software tries different authentication
methods when verifying that a client can access the router.
Configuring the Authorization Order (NSM Procedure)
To configure authorization order in NSM:
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
3.Click the Configuration tab. In the configuration tree, expand Access.
Configuring RADIUS Parameters for AAA Subscriber Management (NSM Procedure)
You can specify the RADIUS parameters for the subscriber access manager feature. You
can specify the IP addresses of the RADIUS servers used for authentication and
accounting, options that provide configuration information for the RADIUS servers, and
how RADIUS attributes are used.
To configure RADIUS parameters for AAA subscriber management in NSM:
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
3.Click the Configuration tab. In the configuration tree, expand Access.
4.Select Profile.
5.Add or modify settings as specified in Table 23 on page 63.
6.Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Table 23: RADIUS Parameter Configuration Details
Your ActionTask
Configure the RADIUS
parameters.
Specify a list of the RADIUS
accounting servers used for
accountingfor DynamicHost
Configuration Protocol
(DHCP), Layer 2 Tunneling
Protocol (L2TP), and
Point-to-Point Protocol
(PPP) clients.
Specify a list of the RADIUS
authentication servers used
to authenticate DHCP, L2TP,
and PPP clients.
Configure the options used
by RADIUS authentication
and accounting servers.
1.Click Authentication Server next to Radius.
2.Click Add new entry next to Authentication Server.
3.In the New authentication-server window, enter the IPv4
address.
1.Click Options next to Radius.
2.In the Comment box, enter the comment.
3.Select the Ethernet Port Type Virtual check box to specify
a port type of virtual.
4.From the Interface Description Format list, select the
information that is included in or omitted from the interface
description that the router passes to RADIUS for inclusion in
the RADIUS attribute 87 (NAS-Port-Id).
Select one of the following:
•
sub-interface—To specify the subinterface.
•
adapter—To specify the adapter.
5.In the Nas Identifier box, enter a string in the range from 1 to
64 characters.
6.From the Accounting Session Id Format list, select the
format the router uses to identify the accounting session.
Select one of the following:
•
decimal—To use the decimal format.
•
description—To use the generic format, in the form jnpr
interface-specifier:subscriber-session-id.
Default: decimal
7.From the Revert Interval list, select the amount of time the
router waits after a server has become unreachable.
Range: 60 through 4294967295 seconds
Default: 600 seconds
8.Select the vlan-nas-port-stacked-format check box to
configure RADIUS attribute 5 (NAS-Port) to include the
S-VLAN ID, in addition to the VLAN ID, for subscribers on
Ethernet interfaces.
Configure the RADIUS client
to use the extended format
for RADIUS attribute 5
(NAS-Port) and specify the
width of the fields in the
NAS-Port attribute.
1.Click Nas Port Extended Format next to Options.
2.In the Comment box, enter the comment.
3.From the Slot Width list, select the number of bits in theslot
field.
4.From the AdapterWidth list, select the number of bits in the
adapter field.
5.From the PortWidth list, selectthe numberof bitsin the port
field.
6.From the Stacked Vlan Width list, select the number of bits
in the SVLAN ID field.
7.From the Vlan Width list, select the number of bits in the
VLAN ID field.
Configuring the RADIUS Parameters (NSM Procedure)
You can specify the options used by the RADIUS authentication and accounting servers.
To configure the RADIUS parameters in NSM:
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
3.Click the Configuration tab. In the configuration tree, expand Access.
4.Select Profile.
5.Add or modify settings as specified in Table 24 on page 66.
6.Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
NOTE: To create a profile, the device should be in the in-device policy mode.
Table 24: RADIUS Parameters Configuration Details
Your ActionTask
Configure the RADIUS
parameters.
1.Click Add new entry next to Profile.
2.Click Radius Options next to Profile.
3.In the Comment box, enter the comment.
4.From the Revert Interval list, select the amount of time the
router waits after a server has become unreachable.
Configuring the RADIUS for Subscriber Access Management, L2TP, or PPP (NSM Procedure)
You can configure RADIUS for subscriber access management, L2TP, or PPP. The servers
are tried in order and in a round-robin fashion until a valid response is received from one
of the servers or until all the configured retry limits are reached.
To configure the RADIUS server in NSM:
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
3.Click the Configuration tab. In the configuration tree, expand Access.
4.Select Profile.
5.Add or modify settings as specified in Table 25 on page 67.
6.Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Table 25: RADIUS Server Configuration Details
Your ActionTask
Configure the RADIUS
servers.
1.Click Add new entry next to Profile
2.Click Radius Server next to Profile.
3.In the Name box, enter the profile name.
4.In the Comment box, enter the comment.
5.From thePort list, selectthe portnumber onwhich tocontact
the RADIUS server.
Default: 1812 (as specified in RFC 2865)
6.In the Secret box, enterthe password to usewith theRADIUS
server. The secret password used by the local router must
match that used by the server.
7.From the Timeout list, select the amount of time that the
local router waits toreceivea responsefrom a RADIUSserver.
Range: 3 through 90 seconds
Default: 3 seconds
8.From the Retry list, selectthe numberof times that therouter
is allowed to attempt to contact a RADIUS server.
Range: 1 through 10
Default: 3
9.In the Source Address box, enter a valid IPv4 address
configured on one of the router interfaces.
10. From the Routing Instance list, select the routing instance
name.
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
3.Click the Configuration tab. In the configuration tree, expand Access.
4.Select Profile.
5.Add or modify settings as specified in Table 26 on page 68.
6.Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Table 26: Session Limit Configuration Details
Your ActionTask
Configure the timeout
interval.
1.Click Add new entry next to Profile.
2.Click Session Options next to Profile.
3.In the Comment box, enter the comment.
4.From the Client Idle Timeout list, select the time in minutes
of idleness after which access is denied.
Range: 1 through 255 minutes
5.From the Client Session Timeout list, select the time in
minutes since initial access after which access is denied.
Configure a client group.
1.Click Client Group next to Session Option.
2.Click Add new entry next to Client Group.
3.In the New client-group window, enter the client group.
Configuring the RADIUS for Subscriber Access Management, L2TP, or PPP (NSM
Procedure)
You can configure RADIUS for subscriber access management, layer 2 tunneling protocol
(L2TP), orpoint-to-point protocol (PPP). The servers are tried inorder andin a round-robin
fashion until a validresponse is received from one of the servers or until all the configured
retry limits are reached.
To configure the RADIUS server in NSM:
1.In the NSM navigation tree, select Device Manager > Devices.
2.Click the Device Tree tab, and then double-click the device to select it.
3.Click the Configuration tab. In the configuration tree, expand Access.
4.Select Radius Server.
5.Add or modify settings as specified in Table 27 on page 69.