Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Adapters Overview

 

Use adapters to integrate JSA Risk Manager with your network devices. By configuring adapters, JSA Risk Manager can interrogate and import the configuration parameters of network devices, such as firewalls, routers, and switches.

Network Topology and Configuration

JSA Risk Manager uses adapters to collect network configurations. The adapters turn the configuration information into a standard format that is unified for supported device models, manufacturers, and types. JSA Risk Manager uses the data to understand your network topology and configuration of your network devices.

To connect external devices in the network, JSA Risk Manager must be able to access the devices. JSA Risk Manager uses the user credentials that are configured in JSA to access the device and to download the configurations.

Process for Integrating Network Devices

To integrate network devices with JSA Risk Manager, follow these steps:

  1. Configure the network device to enable communication with JSA Risk Manager.

  2. Install the appropriate adapter for your network device on your JSA Risk Manager appliance.

  3. Use Configuration Source Management to add your network devices to JSA Risk Manager.

  4. Define the network protocol that is required for communication with your network devices.

    For more information, see the Juniper Secure Analytics Risk Manager User Guide.