Configuring Crypto-Policy Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide
Related
Documentation

Configuring Crypto-Policy Overview

Related
Documentation
266
For Service, select any.
For Action, select Permit.
For Install On, right-click and select Select Target. In the Select Target Devices list,
select vsys music, and then click OK.
From the menu bar, select File > Assign Policy. In the Assign Policy to Devices list,
11.
select vsys music, and then click OK.
Predefined L2V Zones in NSM Overview on page 260
L2V Interface Management in NSM Overview on page 261
In public key cryptography, a public/private key pair is used to encrypt and decrypt data.
Data encrypted with a public key, which the owner makes available to the public, can
only be decrypted with the corresponding private key, which the owner keeps secret and
protected. For example, if Alice wants to send Bob an encrypted message, Alice can
encrypt it with Bob's public key and send it to him. Bob then decrypts the message with
his private key.
The reverse is also useful; that is, encrypting data with a private key and decrypting it
with the corresponding public key. This is known as creating a digital signature. For
example, if Alice wants to present her identity as the sender of a message, she can encrypt
the message with her private key and send the message to Bob. Bob then decrypts the
message with Alice's public key, thus verifying that Alice is indeed the sender.
Public/private key pairs also play an important role in the use of digital certificates.
If Negotiation mode for the IKEV1, Encryption ALG, Authentication ALG, DH Group, and
Authentication Method options are disabled, then these parameters do not provide any
restriction.
NOTE: Although these configurations cannot be set in vsys devices, a vsys
device can use these configurations through root devices that share them.
There are three types of administrators who can configure crypto-policy. They are:
A root administrator
A read-write admin user without any role attribute assigned
A read-write admin user with a cryptographic role
Certificate Authentication Support in NSM Overview on page 267
Self-Signed Certificates in NSM Overview on page 267
Converting L2V to VLAN Trunking (NSM Procedure) on page 262
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents