Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Table 33: SSL Settings (continued)
SSL Settings
Your Action
Cipher
Select an encryption algorithm for SSL:
Authentication
Select an authentication method for SSL:
Related
Documentation
Configuring Network Time Protocol and NTP Backup Server in NSM Overview
Copyright © 2010, Juniper Networks, Inc.
RC4-40 with 40-bit keys
RC4 with 128-bit keys
DES: Data Encryption Standard with 56-bit keys
3DES: Triple DES with 168-bit keys
The RC4 algorithms are paired with MD5; DES and 3DES with SHA-1.
Message Digest version 5 (MD5)—128-bit keys
Secure Hash Algorithm version 1 (SHA-1)—160-bit keys
Secure Hash Algorithm version 2 (SHA-2)—256-bit keys
While SSL is enabled, any device administrator can connect to the security device using
the SSL port. When administrative connections use SSL, in the Web browser URL field,
the device admin must enter the https (instead of http) before the IP address used to
manage the device. If you changed the default SSL port from 443, the device administrator
must also append a colon and the SSL port number to the IP address. For example, to
connect to the 5.5.5.5 interface and SSL port 1443, the device administrator must enter
https://5.5.5.5:1443.
To use HTTP without SSL, disable SSL by clearing the Enable SSL check box. The device
no longer redirects HTTP connections to SSL, and no authentication occurs for the
connection.
Configuring Network Time Protocol and NTP Backup Server in NSM Overview on page 163
Setting ScreenOS Authentication Options Using General Auth Settings on page 165
Configuring HTTP Administrative Connections in ScreenOS Devices Using NSM Overview
on page 161
Use the Date/Time option to configure date and time synchronization on security devices.
The date and time setting on the device affects VPN tunnel setup and schedule objects
used in active security policies.
You configure the device time in relation to GMT.
Configuring Network Time Protocol on page 164
Configuring an NTP Backup Server on page 164
Chapter 5: Administration
163

Advertisement

Table of Contents
loading

Table of Contents