Device-Level Manual Key Vpn: Using Xauth Users Overview; Device-Level Manual Key Vpn: Using Routing-Based Vpn Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Related
Documentation

Device-Level Manual Key VPN: Using XAuth Users Overview

Related
Documentation

Device-Level Manual Key VPN: Using Routing-Based VPN Overview

Copyright © 2010, Juniper Networks, Inc.
For details on adding and configuring a VPN rule in a security policy, see "Adding VPN
Rules to a Security Policy Overview" on page 237.
Device-Level AutoKey IKE VPN: Using VPN Rule Configuration Overview on page 230
Device-Level Manual Key VPN: Using Routing-Based VPN Overview on page 231
Device-Level AutoKey IKE VPN: Using VPN Configuration Overview on page 227
Creating a device-level Manual key VPN is a four stage process.
Configure XAuth Users
Configure Routes (Route-based only)
Configure VPN on Device
Add VPN rules to Security Policy
For VPNs that use IPsec manual key to provide remote access services, you must add
an XAuth user to the security device. An XAuth user has an account on the security device
that guards the protected resources in the VPN; when the user attempts to connect to
a protected resource, the security device authenticates the user.
To add a XAuth user for a security device, in the security device configuration
L2TP/XAuth/Local User, click the Add icon. Enter a name for the user, and then specify:
User—Select a preconfigured local user object that is configured for XAuth.
Remote Setting—Select a preconfigured remote settings object.
IP Pool—Select a preconfigured IP pool object.
Static IP—Enter the static IP address of the local user.
Device-Level Manual Key VPN: Using Routing-Based VPN Overview on page 231
Device-Level AutoKey IKE VPN: Using VPN Configuration Overview on page 227
Device-Level AutoKey IKE VPN: Using VPN Rule Configuration Overview on page 230
For a routing-based VPN member, you must configure:
Tunnel zone or tunnel interfaces on the member.
Static or dynamic routes from the member to other VPN members.
VPN traffic flows through the tunnel zones or tunnel interfaces on the security device,
and uses static or dynamic routes to reach other VPN members. You must create the
tunnel zones and interfaces before configuring routes. For details on configuring tunnel
Chapter 8: Configuring VPNs
231

Advertisement

Table of Contents
loading

Table of Contents