Management; Vpn Abstraction - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide
Related
Documentation
Administering ScreenOS Devices Using NSM Complete System Management

VPN Abstraction

10
Domain (global or a subdomain) in which the action occurred
Object type and name
The detail view of the Audit Log Viewer displays changes from the previous version.
Administering ScreenOS Devices Using NSM Complete System Management on page 10
Security Integration Management Using NSM Overview on page 4
Managing Devices in a Virtual Environment Using NSM on page 6
NSM provides the tools and features you need to manage your devices as a complete
system, as well as individual networks and devices. The following features are supported
in administering ScreenOS devices:
To manage an individual device, create a single device configuration, define a security
policy for that device, and monitor the device status.
To manage a network, create multiple device configurations, define and install policies
for multiple devices, and view the status of all devices in the same UI.
To manage at the system level, create templates and use them to quickly configure
multiple policies and VPNs that control the flow of traffic through your network, view
system-wide log information for network security events, and monitor the status of
NetScreen Redundancy Protocol (NSRP).
The following topics describe about how to administer ScreenOS devices using the
complete system management feature in NSM:
VPN Abstraction on page 10
Integrated Logging and Reporting on page 11
Monitoring Status on page 11
Job Management on page 11
Use VPN Manager to design a system level VPN and automatically set up all connections,
tunnels, and rules for all devices in the VPN. Instead of configuring each device as a VPN
member and then creating the VPN, start from a system perspective: Determine which
users and networks need access to each other, and then add those components to the
VPN.
Using AutoKey IKE, you can create the following VPNs with VPN Manager:
Dynamic, route-based VPNs—Provide resilient, always-on access across your network.
Add firewall rules on top of route-based VPNs to control traffic flow.
Policy-based VPNs—Connect devices, remote access server (RAS) users, and control
traffic flow (traffic flow can also be controlled using L2TP VPNs).
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents