Editing Vpn Protected Resources; Editing Users; Editing The Vpn Configuration; Editing Vpn Overrides - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

VPN Manager Examples

Copyright © 2010, Juniper Networks, Inc.
To revert any changes you have made to the VPN, right-click the VPN name in the
navigation tree and select Revert Changes.

Editing VPN Protected Resources

To edit a protected resource in the VPN, right-click the protected resource and select
Edit Protected Resource. Make your changes, then click OK to save your changes.
If you make changes to a protected resource object that is used in a VPN, NSM
automatically generates new configuration and propagates your changes to all affected
security devices. If you change the security device that protects a resource, NSM removes
the previous security device from all affected VPNs and adds the new security device.
However, NSM does not configure the VPN topology for the new security device—you
must reconfigure the topology to include the new device manually.

Editing Users

To edit a user object in the VPN, right-click the user and select Edit Remote User. Make
your changes, then click OK to save your changes.

Editing the VPN Configuration

To add or delete a member, edit any VPN parameter, or reconfigure the VPN topology,
select the VPN and click OK. Make your changes, then click Save to regenerate the VPN.
NOTE: After you click Save, you cannot revert your changes to a VPN.

Editing VPN Overrides

If you add, edit, or delete an override, the VPN link automatically updates the
autogenerated rules to reflect those edits.
This section provides examples of common VPN types:
"Example: Configuring an Autokey IKE, Policy-Based Site-to-Site VPN" on page 562
"Example: Configuring an Autokey IKE RAS, Policy-Based VPN" on page 566
"Example: Configuring an Autokey IKE, Route-Based Site-to-Site VPN" on page 569
"Example: Configuring XAuth Authentication with External User Group" on page 572
The following sections provide step-by-step instructions on creating each VPN type.
NOTE: For examples on creating a Manual Key VPN, see "Device-Level VPN Examples"
on page 591.
Chapter 11: Configuring VPNs
561

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents