Creating L2TP Over Autokey IKE VPNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Adding VPN Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Configuring the VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Configuring the Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Assign and Install the Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Device-Level VPN Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 616
Example: Configuring a Route-Based Site-to-Site VPN, Manual Key . . . . . . 617
Example: Configuring a Policy-Based Site-to-Site VPN, Manual Key . . . . . . 622
Example: Configuring a Policy-Based RAS VPN, L2TP . . . . . . . . . . . . . . . . . 624
Auto-Connect Virtual Private Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
Configuring ACVPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
IVE VPN Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 627
Chapter 13
Central Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Central Manager Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Regional Server and Central Manager Self-Sufficiency . . . . . . . . . . . . . . . . 629
Self-Sufficient Central Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Self-Sufficient Regional Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Super Admin User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Regional Server Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Management Modes for J Series and SRX Series Devices . . . . . . . . . . . . . . 630
Central Management Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Device Management Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
Using Central Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
Adding a Regional Server Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 631
Deleting a Regional Server Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
Logging into a Regional Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
Installing Global Policy to a Regional Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
Prerule and Postrule Updates during Global Policy Install . . . . . . . . . . . . . . 633
Shared Objects Update During Global Policy Install . . . . . . . . . . . . . . . 633
Name Space Conflict Resolution for Shared Objects . . . . . . . . . . . . . . 633
Name Space Conflict Resolution for Polymorphic Objects . . . . . . . . . . 634
Chapter 14
Topology Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Overview of the NSM Topology Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
About the NSM Topology Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Requirements for a Topology Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
About the NSM Topology Manager Toolbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 636
Initiating a Topology Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Viewing a Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
About the NSM Topology Map Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
SubNets View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
Groups View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
Menu Options in the Topology Map View . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
About the NSM Topology Table Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
Devices View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
EndPoint Devices View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
Links View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
Free Ports View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641
Copyright © 2010, Juniper Networks, Inc.
xxviii
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...