Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 625

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Add a NetScreen-208 security device named "Bozeman." This is the device protects
7.
the FTP server. Configure the Bozeman device with the following interfaces:
Ethernet1 is the Trust IP (10.1.1.1/24) in the Trust zone.
Ethernet3 is the Untrust IP (2.2.2.2/24) in the Untrust zone.
Create a Protected Resource to represent the destination point of the VPN. In this
8.
example, the destination point is the FTP server in the trust zone of Bozeman. In
Protected Resources (under VPN Manager), click the Add icon. Configure the object,
and then click OK:
Create the VPN. In the main navigation tree, select VPN Manager > VPNs. Click the
9.
Add icon and select AutoKey IKE RAS VPN. The New AutoKey IKE RAS VPN dialog
box appears. Configure as shown below:
In Name, enter Reseller Remote Access VPN.
Select Enable.
In Termination Point, select Untrust.
Click OK to save the VPN and return to VPN Manager. The Reseller Remote Access
VPN appears in the main display area.
Configure the policy-based members:
1.
In the main display area, select the Protected Resources link.
In the Protected Resources list, select the rsl-svr1 protected resource, then click
OK:
Configure the termination points of the VPN:
2.
Click the Termination Points link. The Termination Points dialog box appears.
Configure the Bozeman device to use ethernet3 as the termination point (this is the
3.
Untrust zone interface).
Click OK to return to the main display area.
4.
Configure the remote users for the VPN:
5.
In the Remote Users section, click the Users link. The Remote User dialog box
appears.
Select the Reseller local user group.
Click Save to save your configuration changes to the VPN.
Configure the VPN gateway:
6.
Click the Gateway Parameters link. The Properties tab appears.
For Mode, select Main.
In the XAuth section, select XAuth Server and then select the radius1 authentication
server for Auth Server Name. Later, after you have autogenerated the VPN rules
Chapter 11: Configuring VPNs
575

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents