•
Host Name—Enter the name of the L2TP host.
•
Keep Alive—The number of seconds a VPN member waits between sending hello
packets to an L2TP RAS user.
•
Peer IP—Enter the IP address of the L2TP peer.
•
Secret—Enter the shared secret that authenticates communication in the L2TP tunnel.
•
Remote Settings—Select the remote settings object that represents the DNS and WINS
servers assigned to L2TP RAS users after they have connected to the tunnel.
•
IP Pool Name—Select the IP pool object that represents the available IP addresses
that can be assigned to L2TP RAS users after they have connected to the tunnel.
•
Auth Server—Because the L2TP must authenticate L2TP users, use custom settings
to associate those users with a specific Authentication Server. You can also configure
the device to query the remote settings object for DNS and WINS information for those
users.
To use the default authentication server for L2TP users, add the users to the device
first.
NOTE:
When configuring a VPN that includes RAS users, if you added the user as a
L2TP local user and assigned an IP pool and remote settings object on a specific device
in the VPN, those settings override the settings defined in the VPN.
Adding RAS Users
In the Remote User area, you can add RAS users to the VPN. (When configuring an
AutoKey IKE VPN, this area does not appear.) Click the
Users
link to display the user
selection dialog box, then click the Edit icon to select the predefined RAS users or user
groups you want to include in the VPN. For details on creating RAS users and groups.
Defining a Default Gateway
You can include a single RAS user in multiple VPNs. To specify this VPN as the default
entry point for all RAS users listed in the VPN, enable Use as Default Gateway.
Adding Routing-Based Members
In the routing-based configuration area, you can add routing-based members to the VPN.
(When configuring an AutoKey IKE RAS VPN, an L2TP RAS VPN, or an L2TP over AutoKey
IKE RAS VPN, this area does not appear.) A routing-based VPN member is a security
device that will route traffic (statically or dynamically) through a tunnel interface to one
or more VPN members.
VPN Manager automatically creates the necessary tunnel interfaces for each route-based
VPNs member. However, after VPN Manager autogenerates the VPN tunnels, you must
configure static or dynamic routes on the security devices to route traffic through these
tunnel interfaces. For details on creating routes, see the
Network and Security Manager
Configuring ScreenOS and IDP Devices Guide
.
Click the security devices link to display the route-based member selection dialog box.
Copyright © 2010, Juniper Networks, Inc.
564
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...