Defining Vpn Traffic Using Security Protocols In Nsm; Defining Tunnel Creation Methods In Nsm; Using Vpn Manager - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide
Related
Documentation

Defining VPN Traffic Using Security Protocols in NSM

Related
Documentation

Defining Tunnel Creation Methods in NSM

Using VPN Manager

208
Defining VPN Traffic Using Security Protocols in NSM on page 208
Defining Tunnel Creation Methods in NSM on page 208
Defining Members and Topology in NSM on page 207
You can use the following keys to protect the VPN traffic:
Autokey IKE
L2TP
L2TP over AutoKey IKE
Manual key (you cannot use VPN Manager to create a Manual key VPN)
You must also decide if you want to use certificates to authenticate communication
between the VPN members.
Defining Tunnel Creation Methods in NSM on page 208
Preparing Basic VPN Components on page 210
Defining Traffic Types for Data Protection in NSM on page 207
You can use different ways to create the tunnel. They are:
Using VPN Manager on page 208
Creating Device-Level VPNs on page 209
When adding a VPN using the VPN Manager, you enter the VPN members, gateways, IKE
properties, and VPN topology, and then autogenerate the VPN rules that create the VPN.
You can inspect the VPN rules and override any VPN property before sending the VPN
configuration to your devices.
You can choose the VPN type that best matches your VPN requirements. Table 50 on
page 209 describes the VPN types that match your VPN requirements.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents