Security Policies; Vpn Manager - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Table 7: Device Objects in Device Manager (continued)
Device Object
Templates
Device Groups

Security Policies

VPN Manager

Copyright © 2010, Juniper Networks, Inc.
Description
A template is a partial device configuration that you can define once and then use for multiple
devices.
A device group is a user-defined collection of devices.
Security policies contain the firewall, multicast, and VPN rules that control traffic on your
network. Using a graphical, easy-to-use rule building platform, you can quickly create
and deploy new policies to your security devices.
Use security policies to:
Add or modify existing security policies
Add or modify existing VPN rules
Add or modify existing IDP rules
Create policies based on existing policies
Install policies on one or multiple security devices
Delete policies
NOTE: Devices running ScreenOS 6.3, support IPv6 in policy rulebases, IDP,
address objects, and attack objects. You can also configure IPv6 host,
network, and multicast addresses. For more information on IPv6 support,
see the Network and Security Manager Administration Guide..
If the device configurations that you imported from your security devices contained
policies, security policies display those imported policies. For details on editing those
imported polices or creating policies, see Chapter 9, "Configuring Security Policies", or
Chapter 10, "Configuring VPNs", of the Network and Security Manager Administration
Guide.
The VPN Manager contains the VPN abstractions that control the VPN tunnels between
your managed devices and remote users. Using VPN objects, such as protected resources
and IKE Pproposals, you can create multiple VPNs for use in your security policies.
Use the VPN Manager to:
Define the protected resources on your network. Protected resources represent the
network resources you want to protect in a VPN.
Create custom IKE phase 1 and 2 proposals.
Chapter 1: NSM User Interface and NSM Key Management Features
17

Advertisement

Table of Contents
loading

Table of Contents