•
VPN Monitor—When enabled, the device sends ICMP echo requests (pings) through
the tunnel at specified intervals (configurable in seconds) to monitor network
connectivity (the device uses the IP address of the local outgoing interface as the
source address and the IP address of the remote gateway as the destination address).
If the ping activity indicates that the VPN monitoring status has changed, the device
triggers an SNMP trap; VPN Monitor (in RealTime Monitor) tracks these SNMP statistics
for VPN traffic in the tunnel and displays the tunnel status.
•
Rekey—When enabled, the device regenerates the IKE key after a failed VPN tunnel
attempts to reestablish itself. When disabled, the device monitors the tunnel only when
the VPN passes user-generated traffic (instead of using device-generated ICMP echo
requests). Use the rekey option to:
•
Keep the VPN tunnel up even when traffic is not passing through.
•
Monitor devices at the remote site.
•
Enable dynamic routing protocols to learn routes at a remote site and transmit
messages through the tunnel.
•
Automatically populate the next-hop tunnel binding table (NHTB table) and the
route table when multiple VPN tunnels are bound to a single tunnel interface.
•
Optimized—When enabled, the device optimizes its VPN monitoring behavior as follows:
•
Considers incoming traffic in the VPN tunnel as ICMP echo replies. This reduces false
alarms that might occur when traffic through the tunnel is heavy and the echo replies
cannot get through.
•
Suppresses VPN monitoring pings when the tunnel passes both incoming and
outgoing traffic. This can help reduce network traffic.
•
Source Interface and Destination IP—Configure these options to use VPN Monitoring
when the other end of the VPN tunnel is not a security device. Specify the source and
destination IP addresses.
Adding a VPN Rule
After you have configured the VPN on each device you want to include in the VPN, you
can add a VPN rule to a security policy:
•
For policy-based VPNs, you must add a VPN rule to create the VPN tunnel.
•
For route-based VPNs, the VPN tunnel is already in place. However, you might want
to add a VPN rule to control traffic through the tunnel.
For details on adding and configuring a VPN rule in a security policy, see “Adding VPN
Rules” on page 615.
613
Copyright © 2010, Juniper Networks, Inc.
Chapter 12: Configuring VPNs
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...