Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Modifying the Configuration of Security Devices

 

You can use the Modify Configuration page to modify the configuration of one or more managed devices. You cannot modify the configuration of unmanaged devices, devices of the TCA Series family, and devices with the configuration status “waiting for deployment.”

To modify the configuration of one or more security devices:

  1. Select Devices > Security Devices.

    The Security Devices page appears.

  2. Select the devices whose configuration you want to modify.
  3. From the More or right-click menu, select Configuration > Modify Configuration.

    The Modify Configuration page appears with the Basic Setup section selected by default. See Table 1 for the configurations that you can modify.

    Note

    Depending on whether you selected one device or more than one device, the configuration that you can modify differs. If you select only one device, all sections can be modified. If you select more than one device, only the Basic Setup, Syslog, and Security Logging sections can be modified; in addition, configuration parameters that are unique to the device, such as hostname, cannot be modified.

  4. After you have modified the configuration, you can perform the following actions:
    • Click the Save button to save the configuration changes that you made. The changes that you made are saved to the Junos Space database and you are returned to the Security Devices page.

    • Click the Preview Changes button to preview the changes that you made. The Preview Configuration Changes page appears with the CLI tab selected by default. The CLI tab displays the Junos OS commands corresponding to the changes that you made. For an XML view of the configuration, click the XML tab. Click Close to close the page and you are returned to the Modify Configuration page.

    • Click the Save and Deploy button to save the configuration changes and deploy the saved configuration to the device.

      • If the configuration was not modified, the Deploy Configuration page appears displaying a message indicating that no changes were made. Click OK to close the page.

        You are returned to the Modify Configuration page.

      • If the configuration was modified, then the changes are saved to the Junos Space database and the Deploy Configuration page appears.

        • In the Type field, specify whether you want to deploy the configuration immediately or deploy the configuration later. If you choose to deploy the configuration later, you must specify a date and time in the DD/MM/YYYY HH:MM:SS AM/PM/24-hour formats.

        • Click OK.

          The Job Details: Deploy Configuration page appears displaying the details of the job.

        • Click OK to close the Job Details page.

          You are returned to the Security Devices page.

    • Click Cancel to discard the configuration changes that you made. The changes are discarded and you are returned to the Security Devices page

Note

For tenant systems, you can modify configurations such as routing instances, physical interfaces, security logging, access profile, screens, zones, and ICAP redirect.

For logical systems, you can modify configurations such as static routes, routing instances, physical interfaces, security logging, screens, zones, SSL initiation, and ICAP redirect.

Table 1: Modify Configuration

Configuration

Action

Basic Setup

See Modifying the Basic Configuration for Security Devices.

Static Routes

See Modifying the Static Routes Configuration for Security Devices.

Routing Instances

See Modifying the Routing Instances Configuration for Security Devices.

Physical Interfaces

See Modifying the Physical Interfaces Configuration for Security Devices.

Syslog

See Modifying the Syslog Configuration for Security Devices.

Security Logging

See Modifying the Security Logging Configuration for Security Devices.

Link Aggregation

See Modifying the Link Aggregation for Security Devices.

User Management

See Modifying the User Management Configuration for Security Devices.

Screens

See Modifying the Screens Configuration for Security Devices.

Zones

See Modifying the Zones Configuration for Security Devices.

IPS

See Modifying the IPS Configuration for Security Devices.

SSL Initiation

See Modifying the SSL Initiation Profile for Security Devices.

ICAP Redirect

See Modifying the ICAP Redirect Profile for Security Devices.

Aruba ClearPass

See Configuring Aruba ClearPass for Security Devices.

Express Path

See Modifying the Express Path Configuration for Security Devices.

APBR-Tunables

See Configuring APBR Tunables for Security Devices.

Device Information

See Modifying the Device Information Source Configuration for Security Devices.