Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 1025

Table of Contents

Advertisement

user group objects, configuring in firewall
rules......................................................................................462
user objects
about...............................................................................404
configuring in firewall rules......................................462
external...........................................................................405
local.................................................................................404
using external user groups in VPNs.....................406
using MIPs as source or destination in firewall
rules......................................................................................450
V
validation icons......................................................................192
vendor specific attributes See VSAs
version of attack object database.................................293
Violation Viewer.....................................................................719
VIPs
global objects................................................................416
virtual chassis
activating with dynamic IP address......................136
activating with static IP address............................134
importing with dynamic IP address.......................125
importing with static IP address..............................116
virtual security devices See VSD
virtual workspace wallpaper image..............................282
virus pattern file, updating on device...........................300
VPN links, in firewall rules..................................................441
VPN Manager
about.........................................................................29, 552
adding policy-based members..............................570
adding RAS users.........................................................572
adding routing-based members............................572
adding the VPN............................................................569
adding the VPN link....................................................585
autogenerating VPN rules........................................582
configuring ASN1-DN.................................................580
configuring FQDN.......................................................580
configuring gateway...................................................576
configuring gateway security..................................578
configuring gateway, heartbeats............................577
configuring gateway, mode......................................576
configuring gateway, NAT Traversal......................577
configuring IKE IDs......................................................579
configuring IKE properties.......................................580
configuring L2TP...........................................................571
configuring NAT............................................................570
configuring NAT with incoming DIP......................570
configuring NAT with MIP, VIP, and Outgoing
DIP..................................................................................571
Copyright © 2010, Juniper Networks, Inc.
configuring NAT with tunnel interface and
zone...............................................................................571
configuring overrides..................................................583
configuring overrides, device
configuration............................................................584
configuring overrides, policy rules.........................583
configuring Phase 1 proposals................................579
configuring Phase 2 proposals...............................582
configuring PKI..............................................................579
configuring preshared key........................................578
configuring preshared secrets................................579
configuring termination points...............................576
configuring topology...................................................574
configuring topology, full mesh..............................576
configuring topology, hub and spoke...................574
configuring topology, main and branch...............575
configuring topology, site-to-site..........................576
configuring XAuth........................................................577
creating VPNs...............................................................568
default termination point.........................................569
device tunnel summary............................................584
editing VPNs.................................................................585
enable dial backup......................................................570
enabling a VPN............................................................569
enabling VPN Monitor................................................581
enabling VPN Monitor, rekey....................................581
expanded view...................................................552, 585
view properties............................................................569
VPN Monitor
about...............................................................................690
enabling...........................................................................581
permission to view........................................................86
VPN rules in firewall rulebase...........................................441
VPN status summary, viewing........................................690
VPNs
creating with VPN Manager....................................568
device-level, about.....................................................553
device-level, adding VPN rules...............................615
device-level, AutoKey IKE VPNs............................602
device-level, L2TP VPNs...........................................614
device-level, L2TP-over-AutoKey IKE
VPNs.............................................................................615
device-level, manual key VPNs..............................610
device-level, supported configurations...............601
display filter...................................................................692
distribution device-specific view...........................667
filter...................................................................................691
monitoring status.......................................................690
permissions......................................................................87
Index
975

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents