Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Considering the Device Status

    The network status of your device influences the preliminary configuration required before you can add the device to NSM and the method you use to add the device to NSM. Devices can be deployed in your network or undeployed. Deployed devices can be configured with a static or dynamic IP address, which influences the method you use to add them to NSM. Also, undeployed devices are treated differently from deployed devices.

    • Deployed devices—Deployed devices are the devices you are currently using in your existing network. These devices have already been configured with a static or dynamic IP address and other basic information. You can import a device with a static or dynamic IP address to NSM, so long as it has the following enabled:
      • The management interface (fxp0) with the IP address of the device and a user with full administrative privileges for the NSM administrator.
      • A physical connection to your network with access to network resources.
      • Connectivity to the NSM device server, which can be with a static IP address.
      • Telnet or SSHv2, and NETCONF protocol over SSH.

      The NSM process of importing a deployed device differs depending on whether your device is configured with a static or dynamic IP address. For information about importing a device with a static IP address or about importing a device with a dynamic IP address, see the Network Security Manager Administration Guide.

      Note: To import device configurations, the connection between NSM and the managed device must be at least 28.8 Kbps. For details on installing NSM on your network, refer to the Network and Security Manager Installation Guide.

    • Undeployed devices—Undeployed devices are devices that you are not currently using in your network and, typically, for which you do not have IP addresses, zones, or other basic network information. For undeployed devices, you can model a new device configuration and later install that configuration on the device. For more information about adding undeployed devices, see “Modeling a Device” in the Network Security Manager Administration Guide.

    Published: 2013-01-02