Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Modifying the Configuration of Security Devices

You can use the Modify Configuration page to modify the configuration of one or more managed devices. You cannot modify the configuration of unmanaged devices, devices of the TCA Series family, and devices with the configuration status “waiting for deployment.”

To modify the configuration of one or more security devices:

  1. Select Devices > Security Devices.

    The Security Devices page appears.

  2. Select the devices whose configuration you want to modify.
  3. From the More or right-click menu, select Configuration > Modify Configuration.

    The Modify Configuration page appears with the Basic Setup section selected by default. See Table 1 for the configurations that you can modify.

    Note:

    Depending on whether you selected one device or more than one device, the configuration that you can modify differs. If you select only one device, all sections can be modified. If you select more than one device, only the Basic Setup, Syslog, and Security Logging sections can be modified; in addition, configuration parameters that are unique to the device, such as hostname, cannot be modified.

  4. After you have modified the configuration, you can perform the following actions:
    • Click the Save button to save the configuration changes that you made. The changes that you made are saved to the Junos Space database and you are returned to the Security Devices page.

    • Click the Preview Changes button to preview the changes that you made. The Preview Configuration Changes page appears with the CLI tab selected by default. The CLI tab displays the Junos OS commands corresponding to the changes that you made. For an XML view of the configuration, click the XML tab. Click Close to close the page and you are returned to the Modify Configuration page.

    • Click the Save and Deploy button to save the configuration changes and deploy the saved configuration to the device.

      • If the configuration was not modified, the Deploy Configuration page appears displaying a message indicating that no changes were made. Click OK to close the page.

        You are returned to the Modify Configuration page.

      • If the configuration was modified, then the changes are saved to the Junos Space database and the Deploy Configuration page appears.

        • In the Type field, specify whether you want to deploy the configuration immediately or deploy the configuration later. If you choose to deploy the configuration later, you must specify a date and time in the DD/MM/YYYY HH:MM:SS AM/PM/24-hour formats.

        • Click OK.

          The Job Details: Deploy Configuration page appears displaying the details of the job.

        • Click OK to close the Job Details page.

          You are returned to the Security Devices page.

    • Click Cancel to discard the configuration changes that you made. The changes are discarded and you are returned to the Security Devices page

Note:

For tenant systems, you can modify configurations such as routing instances, physical interfaces, security logging, access profile, screens, zones, and ICAP redirect.

For logical systems, you can modify configurations such as static routes, routing instances, physical interfaces, security logging, screens, zones, SSL initiation, and ICAP redirect.