Configuring Vpns; Chapter 8 Configuring Vpns - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 8

Configuring VPNs

Copyright © 2010, Juniper Networks, Inc.
VPNs route private data through a public Internet. Like normal Internet traffic, data in a
VPN is routed from source to destination using public Internet networking equipment.
Unlike normal traffic, however, the source and destination use a Security Association
(SA) pair to create a secure, private tunnel through which the data traverses the Internet.
A tunnel has a defined start point and end point, (usually an IP address), and is a private
connection through which the data can move freely. By encrypting and authenticating
the data while in the tunnel, you can ensure the security and integrity of the data.
VPNs can also connect widely distributed networks to make separate networks appear
as a single Wide Area Network (WAN). VPNs replace costly point-to-point protocol (PPP)
and frame relay connections that require dedicated lines (and sometimes even satellites!)
between your private networks.
This chapter discusses the concepts involved in creating secure tunnels between devices,
details the differences between VPN types, helps you determine the best VPN for your
network, and guides you through creating and configuring your chosen VPN.
NOTE: For step-by-step instructions on creating VPNs, see the Network and
Security Manager Online Help Topic "VPNs" .
Device Level VPN Types and Supported Configurations Overview on page 221
Device Level AutoKey IKE VPN: Using Gateway Configuration Overview on page 221
Device Level AutoKey IKE VPN: Using Routes Configuration Overview on page 227
Device-Level AutoKey IKE VPN: Using VPN Configuration Overview on page 227
Device-Level AutoKey IKE VPN: Using VPN Rule Configuration Overview on page 230
Device-Level Manual Key VPN: Using XAuth Users Overview on page 231
Device-Level Manual Key VPN: Using Routing-Based VPN Overview on page 231
Device-Level Manual Key VPN: Using VPN Configuration Overview on page 232
Device Level Manual Key VPN: Using VPN Rule Configuration Overview on page 234
Device Level L2TP VPN: Using L2TP Users Configuration Overview on page 235
Device Level L2TP VPN: Using L2TP Configuration Overview on page 235
Device Level L2TP VPN: Using VPN Rule Configuration Overview on page 236
219

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 and is the answer not in the manual?

Table of Contents