VPN Manager Examples
Copyright © 2010, Juniper Networks, Inc.
To revert any changes you have made to the VPN, right-click the VPN name in the
navigation tree and select Revert Changes.
Editing VPN Protected Resources
To edit a protected resource in the VPN, right-click the protected resource and select
Edit Protected Resource. Make your changes, then click OK to save your changes.
If you make changes to a protected resource object that is used in a VPN, NSM
automatically generates new configuration and propagates your changes to all affected
security devices. If you change the security device that protects a resource, NSM removes
the previous security device from all affected VPNs and adds the new security device.
However, NSM does not configure the VPN topology for the new security device—you
must reconfigure the topology to include the new device manually.
Editing Users
To edit a user object in the VPN, right-click the user and select Edit Remote User. Make
your changes, then click OK to save your changes.
Editing the VPN Configuration
To add or delete a member, edit any VPN parameter, or reconfigure the VPN topology,
select the VPN and click OK. Make your changes, then click Save to regenerate the VPN.
NOTE: After you click Save, you cannot revert your changes to a VPN.
Editing VPN Overrides
If you add, edit, or delete an override, the VPN link automatically updates the
autogenerated rules to reflect those edits.
This section provides examples of common VPN types:
"Example: Configuring an Autokey IKE, Policy-Based Site-to-Site VPN" on page 578
"Example: Configuring an Autokey IKE RAS, Policy-Based VPN" on page 582
"Example: Configuring an Autokey IKE, Route-Based Site-to-Site VPN" on page 585
"Example: Configuring XAuth Authentication with External User Group" on page 588
The following sections provide step-by-step instructions on creating each VPN type.
NOTE: For examples on creating a Manual Key VPN, see "Device-Level VPN Examples"
on page 607.
Chapter 12: Configuring VPNs
577