Configuring External Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Configuring External User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
Configuring VLAN Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Configuring IP Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Using Multiple IP Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Configuring Group Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Configuring Remote Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Configuring Routing Instance Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Viewing Routing Instance Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Creating Routing Instance Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Configuring NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Configuring Legacy NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Configuring DIP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Configuring MIP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Configuring VIP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Configuring Destination NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Configuring Junos OS NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Configuring Source NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Configuring Destination NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Configuring Certificate Authorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Using Certificate Authorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Configuring Certificate Authorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Configuring CRL Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Using CRLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Configuring CRLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Configuring Extranet Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Configuring Binary Data Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Adding Binary Data Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Viewing, Editing, and Deleting Binary Data Objects . . . . . . . . . . . . . . . . . . . . 427
Configuring Protected Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Creating Protected Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Editing Protected Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Configuring IKE Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Creating Custom IKE Phase1 Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Creating Custom IKE Phase 2 Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Configuring Dial-in Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Creating a Dial-In Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Linking the Dial-In Profile with the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
Setting the Time-out Period for the Modem Dial-In Authentication . . . . . . 432
Configuring Border Signaling Gateway Objects . . . . . . . . . . . . . . . . . . . . . . . . . . 432
Chapter 9
Configuring Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
About Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Viewing Rulebase Columns for a Security Policy . . . . . . . . . . . . . . . . . . . . . 436
Viewing and Editing Custom Policy Fields . . . . . . . . . . . . . . . . . . . . . . . 437
About Rulebases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
Rule Execution Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
About Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
Copyright © 2010, Juniper Networks, Inc.
xx
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...