Vpn Configuration Supported Overview; Planning Your Vpn Using Nsm Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide

VPN Configuration Supported Overview

Related
Documentation

Planning Your VPN Using NSM Overview

Related
Documentation
198
NSM supports all possible VPN configurations that are supported by the CLI and Juniper
Networks ScreenOS Web UI, including:
NAT-Traversal—Because NAT obscures the IP address in some IPsec packet headers,
VPN nodes cannot receive VPN traffic that passes through an external NAT device. To
enable VPN traffic to traverse a NAT device, you can use NAT Traversal (NAT-T) to
encapsulate the VPN packets in UDP. If a VPN node with NAT-T enabled detects an
external NAT device, it checks every VPN packet to determine if NAT-T is necessary.
XAuth—To authenticate remote access server (RAS) users, use XAuth to assign users
an authentication token (such as SecureID) and to make TCP/IP settings (IP address,
DNS server, and WINS server) for the peer gateway.
Planning Your VPN Using NSM Overview on page 198
Device-Level VPN in Device Manager Overview on page 197
Defining Members and Topology in NSM on page 207
NSM offers you maximum flexibility for creating a VPN. You can choose your topology,
authentication level, and creation method. Because you have so many choices, it's a
good idea to determine what your needs are before you create the VPN so you can make
the right decisions for your network.
These decisions include:
VPN Topology—What do you want to connect? How many devices? How do you want
these devices to communicate? Will you have users as VPN members?
Data Protection—How much security do you need? Do you need encryption,
authentication, or both? Is security more or less important than performance?
Tunnel Type—Do you want an always-on connection or traffic-based connection?
VPN Manager or Device-Level—How do you want to create the VPN? Maintain the
VPN?
The following topics provide information to help you make these decisions.
Determining Your VPN Members and Topology
Protecting Data in the VPN
Choosing a VPN Tunnel Type
VPN Checklist
Defining Members and Topology in NSM on page 207
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents