Configuring External Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Configuring External User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Configuring VLAN Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Configuring IP Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Using Multiple IP Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Configuring Group Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
Configuring Remote Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Configuring Routing Instance Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Viewing Routing Instance Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Creating Routing Instance Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
Configuring NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Configuring Legacy NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
Configuring DIP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Configuring MIP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Configuring VIP Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Configuring Junos OS NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Configuring Source NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Configuring Destination NAT Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Configuring Certificate Authorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Using Certificate Authorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Configuring Certificate Authorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Configuring CRL Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Using CRLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Configuring CRLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Configuring Extranet Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Configuring Binary Data Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Adding Binary Data Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Viewing, Editing, and Deleting Binary Data Objects . . . . . . . . . . . . . . . . . . . . 421
Configuring Protected Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
Creating Protected Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Editing Protected Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Configuring IKE Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
Creating Custom IKE Phase1 Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Creating Custom IKE Phase 2 Proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Configuring Dial-in Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Creating a Dial-In Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Linking the Dial-In Profile with the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Setting the Time-out Period for the Modem Dial-In Authentication . . . . . . 426
Configuring Border Signaling Gateway Objects . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Chapter 9
Configuring Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
About Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Viewing Rulebase Columns for a Security Policy . . . . . . . . . . . . . . . . . . . . . 430
Viewing and Editing Custom Policy Fields . . . . . . . . . . . . . . . . . . . . . . . . 431
About Rulebases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
Rule Execution Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
About Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Copyright © 2010, Juniper Networks, Inc.
xx
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...