Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual page 999

Table of Contents

Advertisement

configuring L2TP..........................................................547
configuring NAT...........................................................546
configuring NAT with incoming DIP.....................546
configuring NAT with MIP, VIP, and Outgoing
DIP.................................................................................547
configuring NAT with tunnel interface and
zone.............................................................................546
configuring overrides.................................................558
configuring overrides, device
configuration............................................................559
configuring overrides, policy rules.........................558
configuring Phase 1 proposals................................555
configuring Phase 2 proposals...............................557
configuring PKI.............................................................554
configuring preshared key........................................554
configuring preshared secrets................................555
configuring termination points...............................552
configuring topology..................................................550
configuring topology, full mesh..............................552
configuring topology, hub and spoke..................550
configuring topology, main and branch...............551
configuring topology, site-to-site..........................552
configuring XAuth........................................................553
creating VPNs...............................................................544
default termination point.........................................545
device tunnel summary............................................560
editing VPNs.................................................................560
enable dial backup.....................................................546
enabling a VPN............................................................545
enabling VPN Monitor...............................................556
enabling VPN Monitor, rekey...................................557
expanded view...................................................528, 560
view properties.............................................................545
VPN Monitor
about...............................................................................664
enabling..........................................................................556
permission to view........................................................86
VPN rules in firewall rulebase...........................................431
VPN status summary, viewing........................................664
VPNs
creating with VPN Manager....................................544
device-level, about.....................................................529
device-level, adding VPN rules..............................590
device-level, AutoKey IKE VPNs.............................577
device-level, L2TP VPNs..........................................589
device-level, L2TP-over-AutoKey IKE
VPNs............................................................................590
device-level, manual key VPNs.............................585
device-level, supported configurations...............576
Copyright © 2010, Juniper Networks, Inc.
display filter...................................................................666
distribution device-specific view...........................641
filter..................................................................................665
monitoring status.......................................................664
permissions......................................................................86
planning for....................................................................529
planning for, full mesh................................................531
planning for, hub and spoke.....................................531
planning for, IPsec.......................................................532
planning for, L2TP.......................................................534
planning for, policy-based.......................................534
planning for, route-based.........................................535
planning for, site-to-site...........................................530
preparing certificates.................................................543
preparing group IKE IDs.............................................541
preparing NAT objects...............................................539
preparing protected resources...............................539
preparing RAS users..................................................540
preparing VPN Components...................................538
supported configurations.........................................529
VSAs..........................................................................................397
attribute name..............................................................397
attribute number..........................................................397
attribute type.................................................................397
vendor ID.........................................................................397
vsys clusters, adding............................................................164
vsys devices
adding...............................................................................146
importing..........................................................................147
modeling.........................................................................148
W
warning icon.............................................................................191
Web categories
permission to update on device...............................79
updating on device.....................................................299
updating on system....................................................299
Web filtering
black list.........................................................................450
configuring in firewall rules.....................................450
create custom category.............................................375
custom Web categories............................................450
permissions to update Web categories.................79
predefined Web categories...........................376, 450
SurfControl CPA (Integrated) in rules.................450
SurfControl SCFP/WebSense (Redirect) in
rules.............................................................................450
white list.........................................................................450
Index
949

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents