Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual page 611

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Autokey IKE VPN—Use to authenticate and encrypt traffic between devices and/or
protected resources. An Autokey IKE VPN supports:
Mixed-mode VPNs (policy-based members and route-based members)
Policy-based VPNs
Route-based VPNs
ESP and AH Authentication
ESP AutoKey IKE Encryption
IP traffic
Tunnels between devices (routing-based) and protected resources (policy-based)
Autokey IKE RAS VPN—Use to authenticate and encrypt traffic between remote users
and protected resources. An Autokey IKE RAS VPN supports:
Policy-based VPNs
ESP and AH Authentication
ESP AutoKey IKE Encryption
IP traffic
Remote access users
L2TP RAS VPN—Use to authenticate (but not encrypt) PPP or other non-IP traffic
between RAS users and protected resources. An L2TP RAS VPN supports:
Policy-based VPNs
AH Authentication
PPP or other non-IP traffic
Remote access users
L2TP over Autokey IKE RAS VPN—Use to authenticate and encrypt PPP traffic between
remote users and protected resources. An L2TP over Autokey IKE RAS VPN supports:
Policy-based VPNs
ESP and AH Authentication
ESP AutoKey IKE Encryption
PPP or other non-IP traffic
Remote access users
Creating Device-Level VPNs
You can create the following VPN types:
Chapter 12: Configuring VPNs
561

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents