NOTE:
You cannot delete a predefined service object.
5.
Click
Finish
.
Configuring SCTP Objects
With Stream Control Transmission Protocol (SCTP), you can transmit data in messages
to the SCTP transport layer. Various protocols including IUA, SUA, M2UA, M3UA, H.248,
and DIAMETER, can run on SCTP. You can control the protocols used with the SCTP
protocol filtering tool. After you configure an SCTP object, you can apply it to various
policies.
Configuring an SCTP Object
1.
Select
Object Manager
>
SCTP Objects
. The
SCTP Objects
window opens. You can
add, edit, delete or search for an SCTP object using the icons in the task bar at the
upper left of the window.
2.
Click the
New (+)
icon. A
New SCTP Object window
opens.
3.
Enter a name for the object in the
Name
field.
4.
Check the appropriate boxes to drop payload-protocols.
5.
Check the appropriate boxes to drop m3ua-services.
6.
Click
OK
.
Configuring Authentication Servers
An authentication server provides authentication services for NSM administrators and
remote access services (RAS) users on your network. The information stored in an
authentication server determines the privileges of each administrator.
When the security device receives a connection request that requires authentication
verification, the device requests an authentication check from the external auth server
specified in the policy, L2TP tunnel configuration, or IKE gateway configuration. The
device then acts as a relay between the user requesting authentication and the
authentication server granting authentication.
In NSM, an auth server is an object used in security policies, IKE gateways, and L2TP
tunnels. Each security device includes a default authentication server; however, to enable
an external RADIUS, SecureID, or LDAP server to provide authentication, you must
configure an external authentication server object. You can also configure a RADIUS
authentication server object to provide authentication for the global domain and each
subdomain. For information about configuring a RADIUS server, see “Configuring a RADIUS
Authentication Server” on page 398.
395
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...