Preparing Required Policy-Based Vpn Components Overview; Overview; Configuring Address Objects; Configuring Protected Resources - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Preparing Required Policy-Based VPN Components Overview

Related
Documentation
Policy-Based VPN Creation Using Address Objects and Protected Resources Overview

Configuring Address Objects

Configuring Protected Resources

Copyright © 2010, Juniper Networks, Inc.
Defining Tunnel Creation Methods in NSM on page 208
A policy-based VPN requires several components:
Address objects
Protected resources
NAT objects
User objects
Policy-Based VPN Creation Using Address Objects and Protected Resources Overview
on page 211
Policy-Based VPN Creation Using Shared NAT Objects Overview on page 212
Preparing Basic VPN Components on page 210
The policy-based VPN creation methods are as follows:
Configuring Address Objects on page 211
Configuring Protected Resources on page 211
You must create address objects to represent your network components in the UI. For
details on creating and configuring address objects, see the Network and Security Manager
Administration Guide.
You should determine your protected resources first to help you identify the devices you
need to include in the VPN. After you know what you want to protect, you can use VPN
Manager or manually configure your security devices to create the VPN. A protected
resource object represents the network components (address objects) and services
(service objects) you want to protect and the security device that protects them.
The address specifies secured destination, the service specifies the type of traffic to be
tunneled, and the device specifies where the VPN terminates (typically an outgoing
interface in untrust zone). In a VPN rule, protected resources are the source and destination
IP addresses.
When creating protected resources:
Chapter 7: Planning and Preparing VPNs
211

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents