Table 68: Vpn Tunnel Summary; Monitoring Vpns; Viewing The Vpn Status Summary - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Monitoring VPNs

Viewing the VPN Status Summary

664
Use VPN Monitor to get an at-a-glance status of the up/down status of VPN tunnels as
well as other statistics relevant to your VPN.
NOTE: You must enable the VPN Monitor option on the tunnel when configuring the
tunnel for the device.
The VPN Monitor lists a summary of all the VPN tunnels that have been implemented in
your system. It includes visual indicators that depict whether an existing VPN tunnel is
Up, Down, or Not Monitored. The Summary also includes information describing the VPN
name, VPN type, source, destination, security parameter index., IP address, and protocol.

Table 68: VPN Tunnel Summary

Column
VPN
VPN Type
From Hostname (IP)(Vsys)
From Domain
To Hostname(IP)(Vsys)
To Domain
Status
SPI (in/out)
IP (Local-Peer)
Protocol
Peer GW ID
Description
Name of the active VPN.
Type of tunnel: Dialup or Site-to-Site.
Source security devices used in the VPN. For example, a root security
device named NS5000 with an IP address of 1.1.1.1 appears as
NS5000(1.1.1.1). For a Vsys 1, "NS5000(1.1.1.1)(1)" appears.
Domain in NSM in which the source security device used in the VPN
is managed.
Destination security devices used in the VPN. For example, a root
security device named NS5000 with an IP address of 1.1.1.1 appears
as NS5000(1.1.1.1). For a Vsys 1, "NS5000(1.1.1.1)(1)" appears.
Domain in NSM in which the destination security device used in the
VPN is managed.
VPN Status: Up or Down
Security Parameter Index (SPI) key into and out of the active VPN.
This is the encryption method.
Peer gateway IP address for the active VPN.
Protocol used for the active VPN
Peer gateway ID for the active VPN.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents