Creating Device-Level Vpns - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Table 50: VPN Types
VPN Types
Description
Autokey IKE VPN
Use to authenticate and encrypt traffic between devices and/or protected resources. An Autokey
IKE VPN supports:
Autokey IKE RAS VPN
Use to authenticate and encrypt traffic between remote users and protected resources. An Autokey
IKE RAS VPN supports:
L2TP RAS VPN
Use to authenticate (but not encrypt) PPP or other non-IP traffic between RAS users and protected
resources. An L2TP RAS VPN supports:
L2TP over Autokey IKE
Use to authenticate and encrypt PPP traffic between remote users and protected resources. An
RAS VPN
L2TP over Autokey IKE RAS VPN supports:

Creating Device-Level VPNs

Copyright © 2010, Juniper Networks, Inc.
Mixed-mode VPNs (policy-based members and route-based members)
Policy-based VPNs
Route-based VPNs
ESP and AH Authentication
ESP AutoKey IKE Encryption
IP traffic
Tunnels between devices (routing-based) and protected resources (policy-based)
Policy-based VPNs
ESP and AH Authentication
ESP AutoKey IKE Encryption
IP traffic
Remote access users
Policy-based VPNs
AH Authentication
PPP or other non-IP traffic
Remote access users
Policy-based VPNs
ESP and AH Authentication
ESP AutoKey IKE Encryption
PPP or other non-IP traffic
Remote access users
You can create the following VPN types:
AutoKey IKE VPN
Manual key IKE VPN
L2TP VPN
Redundant site-site VPN
Chapter 7: Planning and Preparing VPNs
209

Advertisement

Table of Contents
loading

Table of Contents