Device Level L2Tp Vpn: Using Vpn Rule Configuration Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide
Table 60: Device Level L2TP VPN: using L2TP Configuration (continued)
L2TP Options
Description
Outgoing Interface
Specify the outgoing interface, which is the interface on the security device that sends and receives
VPN traffic. Typically, the outgoing interface is in the untrust zone.
Keep Alive
Specify the number of seconds a VPN member waits between sending hello packets to an L2TP RAS
user.
Peer IP
Enter the IP address of the L2TP peer.
Secret
Enter the shared secret that authenticates communication in the L2TP tunnel.
Remote Settings
Select the preconfigured remote settings object that represents the DNS and WINS servers assigned
to L2TP RAS users after they have connected to the tunnel.
IP Pool Name
Select the preconfigured IP pool object that represents the available IP addresses that can be assigned
to L2TP RAS users after they have connected to the tunnel.
Auth Server
Use the default settings to use the default authentication server for the domain. To change or assign
a domain authentication server, edit the domain settings; for details, see the Network and Security
Manager Administration Guide.
Use custom settings to specify a preconfigured authentication server object to assign TCP/IP settings
to the gateway and authenticate specific L2TP user or user groups.
Related
Documentation

Device Level L2TP VPN: Using VPN Rule Configuration Overview

Related
Documentation
236
Device Level L2TP VPN: Using VPN Rule Configuration Overview on page 236
Creating Device Level L2TP-over-Autokey IKE VPNs Overview on page 237
Device Level L2TP VPN: Using L2TP Users Configuration Overview on page 235
After you have configured the VPN on each device you want to include in the VPN, you
can add a VPN rule to a security policy:
For policy-based VPNs, you must add a VPN rule to create the VPN tunnel.
For route-based VPNs, the VPN tunnel is already in place. However, you might want
to add a VPN rule to control traffic through the tunnel.
For details on adding VPN rules to a security policy, see "Adding VPN Rules to a Security
Policy Overview" on page 237.
Creating Device Level L2TP-over-Autokey IKE VPNs Overview on page 237
Adding VPN Rules to a Security Policy Overview on page 237
Device Level L2TP VPN: Using L2TP Configuration Overview on page 235
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents