NOTE:
If the security device is running ScreenOS 5.x and configured in transparent
mode, you can only configure the zone (the interface does not appear).
To use a tunnel interface and/or tunnel zone in your VPN, you must first create the
tunnel interface or zone on the device; for details, see “Configuring Tunnel Interfaces
and Tunnel Zones” on page 558 and the
Network and Security Manager Configuring
ScreenOS and IDP Devices Guide
.
•
Tunnel Zone. Select a preconfigured tunnel zone on the security devices to bind the
VPN tunnel directly to the tunnel zone. The tunnel zone must include one or more
numbered tunnel interfaces; when the security devices route VPN traffic to the tunnel
zone, the traffic uses one or more of the tunnel interfaces to reach the protected
resources.
•
Tunnel Interface. Select a preconfigured tunnel interface on the security devices to
bind the VPN tunnel to the tunnel interface. The security devices route all VPN traffic
through the tunnel interface to the protected resources.
•
Configure MIP, VIP, and Outgoing DIP
•
Enable MIP. Enable MIP to use a mapped IP address for the interface.
•
Global MIP. Select the global MIP object that represents the mapped IP address you
want to use for the interface.
•
Global VIP. Select the global VIP object that represents the virtual IP address you
want to use for the interface.
•
Global DIP (Outgoing). You can enable the security device to use a Dynamic IP pool
for outgoing VPN traffic. For each outgoing VPN packet, the device translates the
source address into a IP address selected from the DIP pool. Select the Global DIP
object that represents range of IP addresses available to the security device. (This
DIP pool must include IP address that are routeable on the Internet.)
Configuring L2TP
For L2TP RAS VPNs and L2TP over AutoKey IKE VPN protected resources, you must
configure L2TP settings.
To connect to an L2TP VPN tunnel, the L2TP RAS user uses the IP address and WINS/DNS
information assigned by the user’s ISP. However, when the L2TP RAS user sends VPN
traffic through the tunnel, the security device assigns a new IP address and WINS/DNS
information that enables the traffic to reach the destination network.
Below the Protected Resources pane, select
L2TP/NAT
to display the protecting security
devices for each protected resource. (If you are configuring an AutoKey IKE VPN or
AutoKey IKE RAS VPN, this option does not appear.) Select the device for which you
want to configure L2TP. In the L2TP tab, specify the following values (you cannot edit
the name of the device).
563
Copyright © 2010, Juniper Networks, Inc.
Chapter 12: Configuring VPNs
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...