Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Troubleshooting Device Discovery and Backup

Fix issues with device discovery and backup. You can look at the details for logs and error and warning messages to help you troubleshoot.

Device Backup Failure

Check device login credentials.

  1. On the Admin tab, click Configuration Source Management.

  2. Verify that the credentials to access the target device are correct.

  3. Test the credentials on the target device.

View Device Backup Errors

To see backup errors, do the following steps:

  1. On the Admin tab, click Configuration Source Management.

  2. Click a device, and then click View error.

This table lists the error message identifier, the description of the message and the suggested troubleshooting action.

Table 1: Device Backup Errors

Backup errors

Error description

Suggested troubleshooting step

UNEXPECTED_RESPONSE

Connection attempt timed out

Verify that you're using the correct adapter.

INVALID_CREDENTIALS

Credentials are incorrect

Check credentials in Configuration Source Management.

SSH_ERROR

Connection error

Check that the device is working and is connected to your network. Use other network connection protocols and troubleshooting tools to verify that the device is accessible. Verify that the SSH connection protocol is allowed and that it is configured correctly.

TELNET_ERROR

Connection error

Check that the device is working and is connected to your network. Use other network connection protocols and troubleshooting tools to verify that the device is accessible. Verify that the Telnet connection protocol is allowed and that it is configured correctly.

SNMP_ERROR

Connection error

Check that the device is working and is connected to your network. Use other network connection protocols and troubleshooting tools to verify that the device is accessible. Verify that the SNMP is allowed and that it is configured correctly.

TOO_MANY_USERS

The number of users that are configured to access this device is exceeded.

Check the maximum number of users that are allowed to access the device by logging on to the device and checking the configuration for the maximum number of users that can access the device at the same time.

DEVICE_MEMORY_ERROR

Device configuration errors

Verify that the device is working correctly. Access the device and verify the configuration and check the logs for errors. Use your device documentation to help you to troubleshoot errors.

NVRAM_CORRUPTION_ERROR

Device access issues

In Configuration Source Management, check the access level of the user name that is configured to access the device.

INSUFFICIENT_PRIVILEGE

User that is configured to access the device has insufficient privilege

In Configuration Source Management, check the access level of the user name that is configured to access the device.

DEVICE_ISSUE

Error on the device

Select the device in Configuration Source Management and click View error to see more details.

Backup Completes with Parse Warning

To view more detail about the warning, do the following steps:

  1. Click the Risks tab.

  2. From the navigation menu, click Configuration Monitor.

  3. Click See Log for the selected device in the Device List table.

Verify whether you have the most recent adapter versions

To check your adapter versions, log in as root to the JSA Risk Manager appliance and then type the following command:

yum list adapter\*

You can look for date information in the names of the adapters to help you determine the release dates.

To download the most recent adapter bundle, do the following steps:

  1. In the Product selector field type Risk Manager to filter your selection.

  2. Click JSA Risk Manager.

  3. From the Installed Version list, select the version that is installed on your system.

  4. From the Platform list, select the operating system that is installed on your system, and then click Continue.

  5. Click Browse for fixes, and then click Continue.

  6. To download the most recent adapter bundle, click the adapter-bundle link on the top of the Adapter list.

Verify whether your device backup is current

To verify whether you have a recent backup, do these steps:

  1. Click the Risks tab.

  2. From the navigation menu, click Configuration Monitor.

  3. Double-click the device in the Device List table.

  4. From the toolbar, click History. The most recent configuration that is imported is displayed.

If you don't think that you have the most recent configuration, verify by running the backup again.

Error When Importing Configurations from Your Devices

An incorrectly formatted CSV file can cause a device backup to fail. Do these steps to check the CSV file:

  1. Review your CSV file to correct any errors.

  2. Re-import your device configurations by using the updated CSV file.

Failure to Discover Devices from Check Point SMS (OPSEC)

Follow all steps in the "Adding devices that are managed by a CPSMS console" section of the Juniper Secure Analytics Risk Manager Adapter Configuration Guide, especially steps 7 and 8 where the OPSEC fields must be precise.