•
VPN Topology—What do you want to connect? How many devices? How do you want
these devices to communicate? Will you have users as VPN members?
•
Data Protection—How much security do you need? Do you need encryption,
authentication, or both? Is security more or less important than performance?
•
Tunnel Type—Do you want an always-on connection or traffic-based connection?
•
VPN Manager or Device-Level—How do you want to create the VPN? Maintain the
VPN?
The following sections provide information to help you make these decisions.
Determining Your VPN Members and Topology
You can use a VPN to connect:
•
Security devices—Create a VPN between two or more security devices to establish
secure communication between separate networks.
•
Network components—Create a VPN between a two or more network components to
establish secure communication between specific machines.
•
Remote users—Create a VPN between a user and a security device to enable secure
access to protected networks.
NOTE:
In NSM, remote users are known as remote access service (RAS) users.
Each device, component, and RAS user in a VPN is considered a VPN node. The VPN
connects each node to other nodes using a VPN tunnel. VPN tunnel termination points
are the end points of the tunnel; traffic enters and departs the VPN tunnel through these
end points. Each tunnel has two termination points: a source and destination, which are
the source and destination zones on security device.
Using Network Address Translation (NAT)
Network Address Translation (NAT) maps private IP addresses to public,
Internet-routeable IP addresses. Because your security device is also a NAT server, you
can use private, unregistered IP addresses for your internal network, minimizing the
number of registered IP addresses you must buy and use.
If you enable NAT, when an internal system connects to the Internet, the security device
translates the unregistered IP address in the outbound data packets to the registered
address of the security device. The security device also relays responses back to the
original system. Additionally, because your internal systems do not have a valid Internet
IP address, your systems are invisible to the outside Internet, meaning that attackers
cannot discover the IP addresses in use on your network.
Site-to-Site
Site-to-site VPNs are the most common type of VPN. Typically, each remote site is an
individual security device or RAS user that connects to a central security device.
•
Advantages—Simple, easy to configure.
Copyright © 2010, Juniper Networks, Inc.
546
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...