Configuring ScreenOS Devices Guide
Related
Documentation
Defining VPN Traffic Using Security Protocols in NSM
Related
Documentation
Defining Tunnel Creation Methods in NSM
Using VPN Manager
208
Defining VPN Traffic Using Security Protocols in NSM on page 208
Defining Tunnel Creation Methods in NSM on page 208
Defining Members and Topology in NSM on page 207
You can use the following keys to protect the VPN traffic:
Autokey IKE
L2TP
L2TP over AutoKey IKE
Manual key (you cannot use VPN Manager to create a Manual key VPN)
You must also decide if you want to use certificates to authenticate communication
between the VPN members.
Defining Tunnel Creation Methods in NSM on page 208
Preparing Basic VPN Components on page 210
Defining Traffic Types for Data Protection in NSM on page 207
You can use different ways to create the tunnel. They are:
Using VPN Manager on page 208
Creating Device-Level VPNs on page 209
When adding a VPN using the VPN Manager, you enter the VPN members, gateways, IKE
properties, and VPN topology, and then autogenerate the VPN rules that create the VPN.
You can inspect the VPN rules and override any VPN property before sending the VPN
configuration to your devices.
You can choose the VPN type that best matches your VPN requirements. Table 50 on
page 209 describes the VPN types that match your VPN requirements.
Copyright © 2010, Juniper Networks, Inc.