Editing a Source NAT Rule or Rule Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
Destination NAT Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
Adding a Destination NAT Rulebase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
Adding a Rule Set to a Destination NAT Rulebase . . . . . . . . . . . . . . . . . . . . 544
Adding a Rule to a Destination NAT Rule Set . . . . . . . . . . . . . . . . . . . . . . . . 545
Editing a Destination NAT Rule or Rule Set . . . . . . . . . . . . . . . . . . . . . . . . . . 546
Static NAT Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
Adding a Static NAT Rulebase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
Adding a Rule Set to a Static NAT Rulebase . . . . . . . . . . . . . . . . . . . . . . . . . 547
Adding a Rule to a Static NAT Rule Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
Editing a Static NAT Rule/Rule Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
Chapter 12
Configuring VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
About VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
Creating System-Level VPNs with VPN Manager . . . . . . . . . . . . . . . . . . . . . 552
Creating Device-Level VPNs in Device Manager . . . . . . . . . . . . . . . . . . . . . . 553
Supported VPN Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Planning for Your VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553
Determining Your VPN Members and Topology . . . . . . . . . . . . . . . . . . . . . . 554
Using Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . 554
Site-to-Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554
Hub and Spoke . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Full Mesh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Creating Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Protecting Data in the VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Using IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
Using L2TP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
Choosing a VPN Tunnel Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
About Policy-Based VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
About Route-Based VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
VPN Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Define Members and Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
Define VPN Type: Policy-Based, Route-Based, or Mixed-Mode . . . . . . 560
Define Security Protocol (Encryption and Authentication) . . . . . . . . . . 560
Define Method: VPN Manager or Device-Level? . . . . . . . . . . . . . . . . . . 560
Preparing VPN Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
Preparing Basic VPN Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
Preparing Required Policy-Based VPN Components . . . . . . . . . . . . . . . . . . 562
Configuring Address Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Configuring Protected Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Configuring Shared NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
Configuring Remote Access Service (RAS) Users . . . . . . . . . . . . . . . . . 564
Configuring Required Routing-Based VPN Components . . . . . . . . . . . . . . . 565
Configuring Tunnel Interfaces and Tunnel Zones . . . . . . . . . . . . . . . . . . 566
Configuring Static and Dynamic Routes . . . . . . . . . . . . . . . . . . . . . . . . . 566
Configuring Optional VPN Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Creating Authentication Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Creating Certificate Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Creating PKI Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
Copyright © 2010, Juniper Networks, Inc.
xxvi
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...