Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01 Manual page 174

Configuring secure access devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SECURE ACCESS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring Secure Access Devices Guide
Table 38: Configuring Network Connect Connection Profile Details
Options
General tab
Name
Description
Transport
UDP Port
ESP-to-NCP fallback time-out (seconds)
Key lifetime (time based) (minutes)
Key lifetime (bytes transferred)
(minutes)
Replay Protection
156
Cancel—Cancels the modifications.
On the NC Connection Profiles page, users can prioritize the profiles to show how the
6.
device needs to be evaluated.
Your Action
Enter a name for the NC connection profile.
Enter a description for the NC connection profile.
Select one of the following options:
ESP (maximize performance) —This option uses a UDP encapsulated ESP
transfer method to securely transfer data between the client and the device.
NOTE: ESP is not supported on FIPS 4500/6500 appliances. You must use
oNCP/NCP. Even if you select ESP on a FIPS 4500/6500 appliance it will use
oNCP/NCP.
oNCP/NCP (maximize compatibility) —This option uses the standard oNCP/NCP
transport method for this connection profile.
Enter a value for the UDP port to customize the date transfer parameters. This option
provides the device port through which you intend to direct UDP connection traffic.
The default port number is 4500.
Enter a value for the ESP-to-NCP fallback time-out. This option provides a period
of time (in seconds) to fall back to the NCP connection already established following
UDP connection failure. The default time period is 15 seconds.
Enter a value for the key lifetime. This option provides the period of time (in minutes)
the device continues to employ the same ESP encryption key for this connection
profile. Both the local and remote sides of the encrypted transmission tunnel use
the same encryption key only for a limited period of time to help prevent unauthorized
access. The default time period is 20 minutes.
Enter a value for the key lifetime for the bytes that are transferred. The default value
is 0.
Select the check box to enable this option. When enabled, this option helps protect
against hostile "repeat attacks" from the network.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager

Table of Contents